Xenserver 8 Configuration
Xenserver 8 Configuration
Contents
About XenServer 8 5
What’s new 7
Fixed issues 45
Known issues 48
Deprecation 52
Quick start 61
System requirements 84
Configuration limits 88
Hardware drivers 93
Connectivity requirements 97
Install 138
Upgrade scenarios for XenServer and Citrix Virtual Apps and Desktops 207
IntelliCache 223
PVS‑Accelerator 227
Networking 302
Storage 349
vApps 544
VM memory 547
vApps 599
VM snapshots 605
Troubleshooting 862
Support 865
About XenServer 8
August 6, 2024
XenServer is a virtualization platform that allows organizations to create and manage virtualized
server infrastructures. It is designed to optimize the delivery of Windows and Linux virtual machines,
providing a robust and scalable solution for data center virtualization.
XenServer offers features such as live migration, snapshot and cloning capabilities, and resource
pooling, allowing for efficient management of virtualized workloads. It provides a secure and
high‑performance environment for running applications and services, making it a suitable choice for
businesses looking to streamline their server infrastructure.
Cloud Software Group (CSG) emphasizes XenServer’s integration with Citrix products, creating a com‑
prehensive virtualization and application delivery solution. We aim to enhance the flexibility, agility,
and cost‑effectiveness of IT operations through centralized management and efficient resource uti‑
lization. Overall, XenServer is positioned as a reliable virtualization solution for businesses seeking a
powerful and versatile platform for their server environments.
If you previously used XenServer 8 as a preview, apply the latest set of updates to move seam‑
lessly to the production‑supported version.
If you are using a Citrix Virtual Apps and Desktops license with XenServer, you must change to
a XenServer Premium Edition license. For more information about getting a XenServer license,
see the XenServer website. XenServer is now an entitlement of the Citrix for Private Cloud, Citrix
Universal Hybrid Multi‑Cloud, Citrix Universal MSP, and Citrix Platform License subscriptions for
running your Citrix workloads. Read more.
XenServer 8 is the latest release of XenServer. It succeeds Citrix Hypervisor 8.2 Cumulative Update 1
and includes many new features. For more information about these features, see What’s New.
• You want to try the latest features from XenServer and can regularly update your hosts and
pools.
One notable change between Citrix Hypervisor 8.2 Cumulative Update 1 and XenServer 8 is our
move to delivering features and fixes on an ongoing basis through our frequent updates mech‑
anism. For more information, see Update your XenServer hosts.
• You want to use Windows 11 VMs in your environment.
XenServer 8 delivers support for Windows 11 VMs and vTPMs. For more information, see Win‑
dows VMs.
• You are a Citrix Virtual Apps and Desktops user and want to run your workload on a hypervisor
that contains many features optimized to your environment.
For more information about these features, see Using XenServer with Citrix products.
To learn which versions of Citrix Virtual Apps and Desktops (MCS) and Citrix Provisioning (PVS)
are supported with XenServer 8, see Supported Hypervisors for Citrix Virtual Apps and Desktops
(MCS) and Citrix Provisioning (PVS).
XenServer is now an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid Multi‑
Cloud, Citrix Universal MSP, and Citrix Platform License subscriptions for running your Citrix
workloads. Read more.
XenCenter
XenServer 8 requires the latest version of XenCenter, which has a version number of the form “Xen‑
Center YYYY.x.x”. Previous versions of XenCenter, such as XenCenter 8.2.x, are not supported with
XenServer 8.
XenCenter YYYY.x.x is fully supported with XenServer 8. XenCenter YYYY.x.x is not yet supported for
production use with Citrix Hypervisor 8.2 CU1.
With XenServer 8, frequent updates are made available to you in XenCenter, allowing you to bene‑
fit from a more efficient release process that delivers new features and bug fixes at a faster cadence
than was previously possible. This feature enables you to experience the frequent update model for
administering updates to your XenServer pools and hosts.
During its lifecycle, XenServer 8 provides a stream of frequent and easy‑to‑apply updates, which en‑
able you to consume new features and bug fixes at the earliest possible juncture. You must apply all
available updates periodically. As a result, the behavior and feature set in XenServer 8 can change.
Get started
What’s new
August 6, 2024
Our goal is to deliver new features and product updates to XenServer 8 customers as soon as they
are ready. New releases provide more value, so there’s no reason to delay updates. Through the
XenServer 8 release stream, we deliver updates incrementally in waves to help ensure product quality
and maximize availability.
Note:
If you previously used XenServer 8 as a preview, apply the latest set of updates to move seam‑
lessly to the production‑supported version.
If you are using a Citrix Virtual Apps and Desktops license with XenServer, you must change to
a XenServer Premium Edition license. For more information about getting a XenServer license,
see the XenServer website. XenServer is now an entitlement of the Citrix for Private Cloud, Citrix
Universal Hybrid Multi‑Cloud, Citrix Universal MSP, and Citrix Platform License subscriptions for
running your Citrix workloads. Read more.
XenServer is back
We are once again releasing our product under the XenServer brand. For more information, see the
XenServer website.
As a part of this change, some of the other names and terms used in our product and our documenta‑
tion are changing:
In XenServer 8, the way we release updates to you has changed. Frequent updates are made available,
enabling you to benefit from a more efficient release process that delivers new features and bug fixes
at a faster cadence than was previously possible. Use XenCenter or the xe CLI to apply these updates to
your XenServer hosts and pools at a time that is convenient to you. For more information, see Update
your XenServer hosts.
For more information, see Apply updates by using XenCenter or Apply updates by using the xe CLI.
These updates replace hotfixes for delivering bug fixes. In addition, they deliver improvements and
new features.
For a list of the latest updates available for your Early Access or Normal pools, see the following
pages:
These pages do not list all changes in the Early Access and Normal channels, just a subset. For the full
set of changes available, see the information in the XenCenter Notifications > Updates view.
Windows 11 is now supported on XenServer. For more information, see Windows VMs.
This feature also includes support for vTPMs. You can create and attach a vTPM to a Windows 10 or
Windows 11 VM. For more information, see vTPM.
The vTPM provides a TPM 2.0 compliant API to applications in the VM. TPM 1.2 is not supported.
Licensing changes
The licensing behavior in XenServer 8 is different to that in earlier versions of Citrix Hypervisor and
XenServer. We’ve changed the requirements for Citrix customers, added a new edition, and made
some features available to everyone.
In XenServer 8, you must have a Premium Edition license to run your workloads on a XenServer pool
or host. This is a change from previous versions of Citrix Hypervisor or XenServer, which enabled you
to use your Citrix Virtual Apps and Desktops or Citrix DaaS license directly with XenServer.
For more information about getting a XenServer license, see the XenServer website.
XenServer is now an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid Multi‑Cloud,
Citrix Universal MSP, and Citrix Platform License subscriptions for running your Citrix workloads. Read
more.
To learn which versions of Citrix Virtual Apps and Desktops (MCS) and Citrix Provisioning (PVS) are
supported with XenServer 8, see Supported Hypervisors for Citrix Virtual Apps and Desktops (MCS)
and Citrix Provisioning (PVS).
Trial Edition
You can now try XenServer 8 for free with Trial Edition. The Trial Edition lets you try Premium Edition
features, but in a restricted size pool of up to 3 hosts. For more information about the different editions
of XenServer, see XenServer editions.
Feature changes
The following features, which in previous versions were restricted to Premium Edition customers, are
now also available with Standard Edition:
• Live patching
• XenServer Conversion Manager
You can now import a VHDX/AVHDX file into a pool or specific host as a VM. VHDX is an improved version
of the VHD format that provides better performance, fault tolerance, and data protection features in
addition to a larger capacity. For information on how to use the XenCenter Import wizard to import
a VHDX/AVHDX file, see Import Disk Images.
If you are a Citrix customer, you can also use this feature to migrate your VMs from VMware to
XenServer. As part of its software streaming technology, Citrix Provisioning stores a shared disk
image (vDisk) as a VHDX/AVHDX file. By using the XenCenter Import wizard to import a VHDX/AVHDX
file, you can easily migrate your vDisk from VMware to XenServer. For more information, see Migrating
from VMware.
The NRPE feature is available for XenServer Premium or Trial Edition customers. For more infor‑
mation about XenServer licensing, see Licensing. To upgrade, or to get a XenServer license, visit
the XenServer website.
In XenServer 8, you can use any third‑party monitoring tool that supports Nagios Remote Plugin Ex‑
ecutor (NRPE) to monitor host and dom0 resources, such as Nagios Core. XenServer integrates NRPE
into dom0, enabling you to capture various host and dom0 metrics. For more information, see Moni‑
tor host and dom0 resources with NRPE.
The SNMP feature is available for XenServer Premium or Trial Edition customers. For more infor‑
mation about XenServer licensing, see Licensing. To upgrade, or to get a XenServer license, visit
the XenServer website.
You can now use SNMP and any NMS of your choosing to remotely monitor resources consumed by
XenServer. With this feature, you can also configure traps to monitor your XenServer hosts, which are
agent‑initiated messages that alert the NMS that a specific event has occurred in XenServer. For more
information, see Monitoring host and dom0 resources with SNMP.
Local XFS
You can now use local storage devices with 4 KB physical blocks without needing a logical block size
of 512 bytes by using the new thin‑provisioned local SR type: XFS. For more information, see Local
XFS.
For the full list of supported guest operating systems in XenServer 8, see Guest operating system sup‑
port.
Added
Removed
Deprecated
XenServer Conversion Manager 8.3.1 ‑ the latest version of the XenServer Conversion Manager virtual
appliance ‑ allows you to convert VMs in parallel, enabling you to migrate your entire VMware environ‑
ment to XenServer quickly and efficiently. You can convert up to 10 VMware ESXi/vCenter VMs at the
same time.
For more information on how to use the XenServer Conversion Manager, see XenServer Conversion
Manager.
Improvements to GFS2
Some restrictions on using GFS2 SRs with Citrix Machine Creation Services have been removed.
• You can now use MCS full clone VMs with GFS2 SRs.
• You can now use multiple GFS2 SRs in the same MCS catalog.
For more information about using GFS2 SRs, see Thin‑provisioned shared GFS2 block storage.
Certificate verification
The certificate verification feature ensures that all TLS communication endpoints on the management
network verify the certificates used to identity their peers before transmitting confidential data.
Certificate verification is enabled by default on fresh installations of XenServer 8 and later. If you up‑
grade from an earlier version of XenServer or Citrix Hypervisor, certificate verification is not enabled
automatically and you must enable it. XenCenter prompts you to enable certificate verification the
next time you connect to the upgraded pool.
To improve security, XenServer 8 now allows you to close TCP port 80 on the management interface
and exclusively use HTTPS over port 443 to communicate with XenServer. However, before closing
port 80, check whether all your API clients (Citrix Virtual Apps and Desktops in particular) can use
HTTPS over port 443.
By default, port 80 is still open. However, all internal connections for VM migration now use HTTPS
over port 443 by default.
For more information about how to close port 80, see Restrict use of port 80.
The migration stream compression feature enables you to speed up the memory transfer on slow net‑
works when live migrating a VM by compressing the data stream between the hosts. Enable it from
XenCenter or the xe CLI. For more information, see Pool Properties ‑ Advanced and Pool parameters.
Winbind has replaced PBIS for authenticating Active Directory (AD) users with the AD server and en‑
crypting communications with the AD server. This replacement happens automatically when you up‑
grade. In the unlikely case that external authentication does not work after you upgrade to XenServer
8, leave the AD domain and rejoin it.
• Winbind automatically updates the machine account password every 14 days or as specified by
the configuration option winbind_machine_pwd_timeout.
Integrated PVS‑Accelerator
In previous releases of XenServer or Citrix Hypervisor, the PVS‑Accelerator was provided as a supple‑
mental pack. The PVS‑Accelerator is now included in the base XenServer installation. The behavior of
the PVS‑Accelerator is otherwise unchanged and you must configure it before use.
You can now network boot a VM over an IPv6 network. This feature is only supported for UEFI VMs, not
BIOS VMs.
Removed features
Note:
Logs for the Health Check service are retained by Windows for troubleshooting purposes. To
remove these logs, delete them manually from %SystemRoot%\System32\Winevt\Logs
on the Windows machine running XenCenter.
PuTTY is no longer bundled with XenCenter. To launch an SSH console to a XenServer host by using
XenCenter, you must install an external SSH console tool and ensure that XenCenter is configured to
use it. For more information, see Configure XenCenter to use an external SSH console.
The following Broadcom binaries are no longer included in the XenServer installation:
• elxocmcore
• elxocmcorelibs
• hbaapiwrapper
To download these binaries from the Broadcom Emulex download page, complete the following
steps:
The following Marvell command‑line binaries are no longer included in the XenServer installation:
• QCS
To download QCC from the Marvell QLogic download page, complete the following steps:
To install this application, follow the instructions in the QConvergeConsole Command Line Utility
User’s Guide.
Compatibility notes
September 3, 2024
The following features, preview features, improvements, and bug fixes are available in the Early Access
update channel. Some of the latest listed entries might not be available in the Normal channel yet.
Note:
This article doesn’t list all changes in the Early Access channel, just a subset. For the full and
up‑to‑date set of changes available, see the information in the XenCenter Updates view.
Checksum: efd16ccca65ff916f489c229fe8c550bdc1b69dce75a1d675e28a84364452246
These updates contain upstream code changes for the following issue:
• CVE‑2024‑31145
• Add distributed tracing for external authentication and HTTP layer functions.
• Update microsemi‑smartpqi to version 2.1.30‑031.
Checksum: 23dac6573d9699cf951899757a9ff3586b815342e08d1f40f361346c2c24e47a
These updates restore the metadata backup/restore functionality present in prior versions of
XenServer/Citrix Hypervisor. For more information, see Backup and restore capabilities in XenServer
xsconsole.
• Improvements to the xen‑hvmcrash utility which can be used to crash a VM for troubleshooting
purposes.
• Improve the connection performance on the client side when using XenAPI.py.
• Add power measurements data “DCMI‑power‑reading”in RRD.
Checksum: e8e28aad4586df43d54159467ce70ed86ba369a2030d6a3c98c4b5c3aeef23cf
Checksum: 235dced393357dc5e9f513329020807d5cf2414c37fa908206a7e7249b0faec8
• A race condition in joining a XenServer pool cluster which causes the error “GFS2 cluster state
is inconsistent”.
• A typo in the error message reported when a XenServer pool can’t be authenticated when con‑
necting a XenServer Workload Balancing appliance.
• VM.hard_shutdown gets stuck when it attempts to cancel another VM.clean_shutdown
session that has already been logged out.
• Java SDK fails marshalling on unknown properties.
• Fix for rare datapath crash occurring on VM start for GFS2 and XFS storage types.
• A rare bug can cause the VM I/O handler to not start correctly.
• Crash data is not collected when using hardware with Intel Xeon Gen3 (or newer) CPUs with the
BIOS configuration set to “CPU Physical Address Limit”.
Checksum: 3e03abdfd0f69ea951af221ac9c3d1e400081a09dfc96465d03ebe44501a8e43
These updates include security fixes. For more information, see the security bulletin.
Checksum: 3573504d45e1bb87e827ebd1761724cdfe9606bb6e9e2811ddad0d68a59959ea
• In rare conditions, the QEMU Storage I/O processor used by the GFS2 and XFS Storage Reposi‑
tory types can crash as the associated virtual machine transitions from emulated to paravirtual
storage. This crash causes the virtual machine to lose access to its virtual disks and fail to boot.
• When creating an iSCSI SR by using xsconsole, xsconsole displays a “timed out”error message
even when the SR is created successfully.
• The HTTPS is used unnecessarily in localhost VM migration.
• Distributed tracing: An issue in instrument which would cause errors like “load() missing 1 re‑
quired positional argument: ‘sr_uuid’”.
• A performance issue in intel‑i40e.
• When requesting bug‑report archives, tapdisk logs are not included in the full bug‑report
archive.
• When requesting bug‑report archives, collected kernel module infos are not complete in rare
cases.
Checksum: 894d747672c6ab2ae734882365fa853420c3c5bb40d4c335cc860ca60aeba803
These updates contain upstream code changes for the following issues:
Checksum: 537cc1784dd4b1b06a13a71782664a2458b31919a9ce20df66c9c2fd7d5ed1d3
• A fix for a regression introduced in the previous update. The regression would cause a Citrix
Hypervisor 8.2 CU1 pool with clustering configured to fail to RPU to XenServer 8.
• When using DHCP with network adaptors used for software‑boot‑from‑iSCSI, the connectivity to
storage becomes non‑functional after the connection is dropped, rendering the hosts unusable.
• VGPU VM start fails with “No free virtual function found”. As part of a start, resources like VGPU
are allocated for a VM in “scheduled_to..”fields. These are not cleared when the VM start fails.
• When connecting to the same XenServer pool with multiple instances of XenCenter, some in‑
stances might not show available updates.
• Fixes for storage management.
• Reduce the amount of old log files created by ensuring that empty log files are not rotated.
• Update python‑hwinfo to 0.1.11.
• Remove gnu‑free‑sans‑fonts package.
• Ports of AD controllers are now taken into account on setup. Previously port 88 was used for all
of them.
• Add more trace points and attributes in distributed tracing.
• Reduce log spam of gpumon and rrdd.
Checksum: e780184d335733087c1cb249061023d7db61d071b4c7d629398959d51f1426dc
These updates include security fixes. For more information, see the security bulletin.
Checksum: 12af14e8b2f9ad0d9ac53b8044e4cd9349bbaf7bcf9378b19f08040b07572aa4
These updates include improvements that will be included in the next release of the installer.
Checksum: 3df138281313d9049a5524743fe32a327092900392624322a7a06448aaba54fe
• Add I/O statistics reporting for GFS2 and XFS SRs, to display in the XenCenter VM performance
graphs.
• General performance and bug fixes for post delete snapshot cleanup operations.
• Host backups are interrupted by an error.
Checksum: cc315022075aa4186d06e6f05a5bafbb16007079ba374548b12e4b1d1b9135b4
Checksum: 551daac02721517dccba9cb87093fc96734a49f9ffeb1f0d03fbfea4342c70d5
• Fix a bug in RTC emulation for HVM guests that occasionally causes OVMF to fail an assertion.
• Fix a bug in livepatch application when CET‑IBT is active, leading to a full host crash.
• Fix a heterogeneous CPU levelling bug between Ice Lake and Cascade Lake.
Checksum: aad9014d7a618f7cba0332b9bc4c95f9faee096c6495efb5d31d222a017e7c5b
– Rocky Linux 8
– Rocky Linux 9 (preview)
– SUSE Linux Enterprise 15
– Debian Bookworm 12 (preview)
– Oracle Linux 8
• Under some conditions DLM control daemon will fail to join a lockspace, preventing cluster op‑
erations from functioning.
• Some devices that are not intended for use for LVM volumes were not excluded from being
scanned, which can cause operations to fail.
• Post‑install warning on pvsproxy.
Checksum: c11e016b345e5119adb4f9edaffe3537cbf64ed252e3e7caebd30b380ec2a8b4
Checksum: dc7acd63c2c5a920e77328070d7396dcb1df03ba670424fae3f4a29f47ff1a64
These updates include security fixes. For more information, see the security bulletin.
Checksum: bbe72f61afa19b78c5f47fa59c2b3a527b018029bf34aa92ba3e9e4e35a14a46
• Sometimes, when XAPI attempts to write logs, it is prevented from doing so for a limited amount
of time. This behavior is caused by an issue in log rotation.
• If you create a new installation of XenServer on a host with a local XFS SR on an NVMe
device, your local storage does not attach on boot. The action fails with the error: “Raised
Server_error(SR_BACKEND_FAILURE, [ FileNotFoundError; [Errno 2] No such file or directory:
‘/sys/block/nvme0n/queue/scheduler’])”. After applying this fix, you can attach the local
storage manually.
Checksum: 574edaa4f5fe4960882e3a7ccd3de3084df6b89624dfa63fb7253e73120f1a41
Checksum: e7dd9deb95cad01b70bac2d02aec7fa0d649c16b55cdd91d32affa6377631bae
Important:
• After upgrading from Citrix Hypervisor 8.2 CU1, the background maintenance services for GFS2
SRs do not start correctly.
CHecksum: e8fe79a0d028b40a090a2d77d24d05caaa0fd5116080c7e3aaaed14458e60ede
• If the pool coordinator is not running or the toolstack is being restarted, vTPM operations per‑
formed by the user or by Windows in the background might fail.
• Fix the names of some SR types in xsconsole.
• Upstream code changes that may reduce false‑positive reports for CVE‑2023‑38545.
• Upstream code changes that may reduce false‑positive reports for CVE‑2023‑28486.
Checksum: b43aeaa6613a4b89d3d907cdb3704e0aca00c4d1122a01f1c4abac116602c2e4
• If you use XenServer 8 preview with a Citrix Virtual Apps and Desktops license, this license is
deprecated and is no longer supported with XenServer 8.
To run a Citrix Virtual Apps and Desktops workload on a XenServer 8 pool, you must get a
XenServer Premium Edition license for all hosts in the pool. For more information, visit the
XenServer website.
XenServer is now an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid Multi‑
Cloud, Citrix Universal MSP, and Citrix Platform License subscriptions for running your Citrix
workloads. Read more.
• XSA‑452 CVE‑2023‑28746
Checksum: 541fac9e361504d8c568fb6c5bbdef2442d5674ea5e17a2f1cf999c51e5b0608
Note:
Before applying these updates, update your XenCenter to version 2024.1.0 or later. The latest
version of XenCenter is available at https://xenserver.com/downloads.
• The “preview”label has been removed from the Windows 11 template. This guest operating
system is ready to be fully supported when XenServer 8 moves from preview to fully supported
in production.
• When collecting host and guest performance statistics, the collected RRD files are often not up‑
to‑date.
• In XenServer 8 clusters with GFS2 SRs, when collecting the XenServer databases, the cluster
daemon database is not collected.
• When collecting a server status report, if you request a full bug‑report archive and the file size
limit of a database for xcp‑rrdd‑plugins is exceeded, the logfiles of xcp‑rrdd‑plugin are not col‑
lected.
• When collecting a server status report, if you use SSH login:
– The interactive mode where you confirm individual files for collection does not work with‑
out specific user input.
– When downloading uncompressed RRD data with a deprecated method, the VM RRDs are
not collected.
• CVE‑2023‑45230 ‑ Buffer overflow in the DHCPv6 client via a long Server ID option.
• CVE‑2023‑45231 ‑ Out of Bounds read when handling a ND Redirect message with truncated
options.
• CVE‑2023‑45232 ‑ Infinite loop when parsing unknown options in the Destination Options
header.
• CVE‑2023‑45233 ‑ Infinite loop when parsing a PadN option in the Destination Options header.
• CVE‑2023‑45234 ‑ Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise
message.
• CVE‑2023‑45235 ‑ Buffer overflow when handling Server ID option from a DHCPv6 proxy Adver‑
tise message.
• An issue with the use of vTPM while the toolstack is being restarted.
• The status of NIC bonds is not reflected correctly.
• Improvements to the way you apply software updates to your XenServer hosts and pools. For
more information, see Apply updates.
• Update the multipath configuration used for PURE FlashArray SAN to match the vendors recom‑
mendations.
• Improve error messages when file SR types are read‑only.
• Improvements to distributed tracing.
Checksum: 57b11c890cc12413b41310e4aef70b10589b50663ba1f5371e3a70c46bd7fa4d
• XSA‑451 CVE‑2023‑46841.
Checksum: 4ac84bc81dcd650b1525d7a1866363e6ff57988fd23b15f01f4db98a1da29984
• Monitor host and dom0 resources with SNMP. This feature can be used from the next version of
XenCenter. For more information, see Monitoring host and dom0 resources with SNMP.
• If you try to enable SR‑IOV on an Intel E810 NIC in XenCenter, the VF assigned to a VM does not
work after the VM boots.
Checksum: 4ca53a5e440cd52b4b179b2dfb208e159cf16e918f53130b227eae3fb7b3d596
• Add a new check (check_multipath) to the NRPE service to enable monitoring of the multi‑
path status.
• When there are separate independent Target Portal Groups within the IQN, XenServer cannot
log into all iSCSI portals.
• When creating an SMB ISO SR share, it is no longer necessary to supply credentials when con‑
necting to an SMB server that permits guest access.
• Part of the toolstack may unexpectedly stop running.
• You are unable to import a suspended Windows 11 VM that has been exported as an XVA with
power state preservation.
• When a VM with vTPM is started or quickly migrated back and forth between pools, a race con‑
dition can occur.
• pool-eject operations run in parallel can cause TLS verification errors.
• Fixes for several low‑probability issues with GFS2 SRs.
Checksum: bef04584f387457b7665a7f56b3f01be4c03edf67c383875ecbc8ebe92b73786
• Support for UEFI boot and Secure Boot for Linux guest operating systems. For more information,
see Guest UEFI boot and Secure Boot.
• Provide more detailed information about a XenServer host’s SHA256 and SHA1 TLS certificates
in the host console view in XenCenter.
Checksum: a74ad78f7b0537f82cb5069c6b781696829f4053b7a06020ab1436332f684ff1
These updates include security fixes. For more information, see the security bulletin.
Checksum: 1633ab16bf0a6b458c4f863b07328e07ee85371fed34145050552c02e46657da
• Update XenServer VM Tools for Linux to version 8.4.0‑1, available to download from the
XenServer downloads page. From this version, you can use the install.sh script to unin‑
stall XenServer VM Tools for Linux. For more information, see Uninstall XenServer VM Tools for
Linux.
• Ensure that the XenServer welcome message is always displayed when connecting to a
XenServer host console and that the message is correctly line wrapped.
Jan 4, 2024
Checksum: 6240ec0cbc29f6f5204f7f6af7bbce28e96e9dfb9e001a4f0cfa4609214f9d8e
• Sometimes, after migrating a VM from one pool to another, the VM’s alerts are not successfully
copied to the destination pool or removed from the source pool.
• Sometimes the pool database is not restored from the redo‑log (part of the high availability
feature).
Checksum: 95f70cca5fd3b79081c30837352ed941a7d497899062d892fbc2aa51daacfd78
• When using multipathing with Dell EqualLogic PS Series Firmware v7.x, you might see iSCSI
protocol errors.
Checksum: 1633ab16bf0a6b458c4f863b07328e07ee85371fed34145050552c02e46657da
• Sometimes the redo‑log (part of the high availability feature) does not replay all database
writes.
• When running the vdi-copy command to copy a VDI to an SR, XenServer fails to correctly re‑
port the progress of the operation.
• In XenCenter, customizing a template and then exporting and reimporting it can result in the
template failing to import.
Checksum: 4abd37e1e88675bf3793b4704786a97ba43e2a455989546de07f934f20e28135
• The “preview”label has been removed from the Ubuntu 22.04 template. This guest operating
system is ready to be fully supported when XenServer 8 moves from preview to fully supported
in production.
Checksum: 052f8594042ceeb93bbe7d4dd75fc7fcd8af7092c3cd08b2522b6bd2a6694c17
These updates include security fixes. For more information, see the security bulletin.
Nov 6, 2023
Checksum: 210d00c5764f4d8ee0337ef827863eb8cde43fe089d888dd3faa2ee5d05a24ad
Nov 3, 2023
Checksum: 4d516d4b6c72eb3be4f60e78371db5fde8b6292395ddaf411faf52507f22f516
Checksum: c6b1397dc454e7236634e07f7872ec95e3f6938bcb5dc62316dd112899926ec7
• Deploying Windows using PXE boot and Configuration Manager can cause Windows to hang.
• If time synchronization is disabled, Windows VMs do not return the correct time.
• UEFI boot mode Windows VMs now show the Windows logo during boot instead of the Tianocore
logo.
Checksum: 85e8edbaf7469a29cc56fe6880e93c2618fb90002d2d4cdf0b372719413c4525
Checksum: 7623587c09c7198237bc9dd673fba33307fbaee18e0baec50c1e2ddbee165b91
– Debian Bookworm 12
– Rocky Linux 9
– CentOS Stream 9
Note:
Customers who wish to use these guest operating systems must also install XenServer VM
Tools for Linux v8.3.1‑1 or later, available to download from the XenServer product down‑
loads page.
Checksum: 0ab01aa0c5623b52219b279b48f6b13f8db4a0a699a25b61a7aa35b39243ca89
These updates include security fixes. For more information, see the security bulletin.
Oct 2, 2023
• Support for the Red Hat Enterprise Linux 9 operating system. Refer to the Red Hat Enterprise
Linux 9 release notes for further technical information.
Note:
Customers who wish to use this guest OS must also install Citrix VM Tools for Linux v8.3.1‑1 or
later, available to download from the XenServer product downloads page.
• Enable interrupt balancing for Fibre Channel (FC) PCI devices. This improves performance on
fast FC HBA SRs, especially if multipathing is used.
• Fix for AMD errata #1474. Disable C6 after 1000 days of uptime on AMD Zen2 systems to avoid a
crash at ~1044 days.
• Performance metrics are not available for GFS2 SRs and disks on these SRs.
• You cannot snapshot or checkpoint a suspended VM if that VM has a vTPM attached.
• If a XenServer host crashes, or shuts down abruptly, starting more Windows 11 VMs or migrating
more Windows 11 VMs onto that host eventually fails.
• If, when iSCSI SRs are attached, not all the possible paths are available (for example, an offline
controller remote port is down), the SR does not have additional iSCSI sessions added when
those remote ports are accessible again.
Updates progress from the Early Access update channel to Normal on a regular cadence. The follow‑
ing features, preview features, improvements, and bug fixes are available in the Normal update chan‑
nel.
Note:
This article doesn’t list all changes in the Normal channel, just a subset. For the full and up‑to‑
date set of changes available, see the information in the XenCenter Updates view.
Checksum: 23dac6573d9699cf951899757a9ff3586b815342e08d1f40f361346c2c24e47a
These updates restore the metadata backup/restore functionality present in prior versions of
XenServer/Citrix Hypervisor. For more information, see Backup and restore capabilities in XenServer
xsconsole.
These updates contain fixes for the following issues:
• Improvements to the xen‑hvmcrash utility which can be used to crash a VM for troubleshooting
purposes.
• Improve the connection performance on the client side when using XenAPI.py.
• Add power measurements data “DCMI‑power‑reading”in RRD.
• Update Intel microcode to the IPU 2024.3 drop.
Checksum: 235dced393357dc5e9f513329020807d5cf2414c37fa908206a7e7249b0faec8
These updates contain fixes for the following issues:
• A race condition in joining a XenServer pool cluster which causes the error “GFS2 cluster state
is inconsistent”.
• A typo in the error message reported when a XenServer pool can’t be authenticated when con‑
necting a XenServer Workload Balancing appliance.
• VM.hard_shutdown gets stuck when it attempts to cancel another VM.clean_shutdown
session that has already been logged out.
• Java SDK fails marshalling on unknown properties.
• Fix for rare datapath crash occurring on VM start for GFS2 and XFS storage types.
• A rare bug can cause the VM I/O handler to not start correctly.
• Crash data is not collected when using hardware with Intel Xeon Gen3 (or newer) CPUs with the
BIOS configuration set to “CPU Physical Address Limit”.
Checksum: 3e03abdfd0f69ea951af221ac9c3d1e400081a09dfc96465d03ebe44501a8e43
• In rare conditions, the QEMU Storage I/O processor used by the GFS2 and XFS Storage Reposi‑
tory types can crash as the associated virtual machine transitions from emulated to paravirtual
storage. This crash causes the virtual machine to lose access to its virtual disks and fail to boot.
• When creating an iSCSI SR by using xsconsole, xsconsole displays a “timed out”error message
even when the SR is created successfully.
• The HTTPS is used unnecessarily in localhost VM migration.
• Distributed tracing: An issue in instrument which would cause errors like “load() missing 1 re‑
quired positional argument: ‘sr_uuid’”.
• A performance issue in intel‑i40e.
• When requesting bug‑report archives, tapdisk logs are not included in the full bug‑report
archive.
• When requesting bug‑report archives, collected kernel module infos are not complete in rare
cases.
Checksum: 8c7a5ce6879077426cfc04d2a4e34a27bc119a0a916ca6d96bbd2edb2740819e
These updates include security fixes. For more information, see the security bulletin.
Checksum: 894d747672c6ab2ae734882365fa853420c3c5bb40d4c335cc860ca60aeba803
This update contains upstream code changes for the following issues:
• A fix for a regression introduced in the previous update. The regression would cause a Citrix
Hypervisor 8.2 CU1 pool with clustering configured to fail to RPU to XenServer 8.
• When using DHCP with network adaptors used for software‑boot‑from‑iSCSI, the connectivity to
storage becomes non‑functional after the connection is dropped, rendering the hosts unusable.
• VGPU VM start fails with “No free virtual function found”. As part of a start, resources like VGPU
are allocated for a VM in “scheduled_to..”fields. These are not cleared when the VM start fails.
• When connecting to the same XenServer pool with multiple instances of XenCenter, some in‑
stances might not show available updates.
• Fixes for storage management.
• Reduce the amount of old log files created by ensuring that empty log files are not rotated.
• Update python‑hwinfo to 0.1.11.
• Remove gnu‑free‑sans‑fonts package.
• Ports of AD controllers are now taken into account on setup. Previously port 88 was used for all
of them.
• Add more trace points and attributes in distributed tracing.
• Reduce log spam of gpumon and rrdd.
Checksum: e780184d335733087c1cb249061023d7db61d071b4c7d629398959d51f1426dc
These updates include security fixes. For more information, see the security bulletin.
Checksum: 12af14e8b2f9ad0d9ac53b8044e4cd9349bbaf7bcf9378b19f08040b07572aa4
• Add I/O statistics reporting for GFS2 and XFS SRs, to display in the XenCenter VM performance
graphs.
• General performance and bug fixes for post delete snapshot cleanup operations.
• Host backups are interrupted by an error.
• When reloading its configuration, perfmon crashes.
• You cannot export VDIs to VHD files when the former has a base VDI.
• When shutting down a host, a VM can encounter errors when writing to the TPM.
• Fix for some issues with upgrading.
Information:
All updates following this note are included in the installation ISO available on https://www.xe
nserver.com/downloads from June 4, 2024. After installing a new XenServer host from the ISO,
only the updates listed before this note are required to be applied to your new host.
Checksum: 3aa8976982173fe9b7daf744d26f5418c91618777bfa89dcf07cf4e0962a64ae
These updates also include improvements that will be included in the next release of the installer.
Checksum: cc315022075aa4186d06e6f05a5bafbb16007079ba374548b12e4b1d1b9135b4
• Fix a bug in RTC emulation for HVM guests that occasionally causes OVMF to fail an assertion.
• Fix a bug in livepatch application when CET‑IBT is active, leading to a full host crash.
• Fix a heterogeneous CPU levelling bug between Ice Lake and Cascade Lake.
Checksum: 936b99500931cc5449938e74053a961c6274b8c93dc9d01c0929085d72becab7
Checksum: aad9014d7a618f7cba0332b9bc4c95f9faee096c6495efb5d31d222a017e7c5b
– Rocky Linux 8
– Rocky Linux 9 (preview)
– SUSE Linux Enterprise 15
– Debian Bookworm 12 (preview)
– Oracle Linux 8
• Under some conditions DLM control daemon will fail to join a lockspace, preventing cluster op‑
erations from functioning.
• Some devices that are not intended for use for LVM volumes were not excluded from being
scanned, which can cause operations to fail.
• Post‑install warning on pvsproxy.
Checksum: c11e016b345e5119adb4f9edaffe3537cbf64ed252e3e7caebd30b380ec2a8b4
Checksum: dc7acd63c2c5a920e77328070d7396dcb1df03ba670424fae3f4a29f47ff1a64
• Sometimes, when XAPI attempts to write logs, it is prevented from doing so for a limited amount
of time. This behavior is caused by an issue in log rotation.
• If you create a new installation of XenServer on a host with a local XFS SR on an NVMe
device, your local storage does not attach on boot. The action fails with the error: “Raised
Server_error(SR_BACKEND_FAILURE, [ FileNotFoundError; [Errno 2] No such file or directory:
‘/sys/block/nvme0n/queue/scheduler’])”. After applying this fix, you can attach the local
storage manually.
Checksum: 617080b043b1c3766f9ffb5183616cbf7117d78c2631317fa614ec4699213e5e
These updates include security fixes. For more information, see the security bulletin.
Checksum: 574edaa4f5fe4960882e3a7ccd3de3084df6b89624dfa63fb7253e73120f1a41
Checksum: e7dd9deb95cad01b70bac2d02aec7fa0d649c16b55cdd91d32affa6377631bae
• Upstream code changes that may reduce false‑positive reports for CVE‑2023‑28486.
Checksum: 49b11e4371d94e6edbc3f39d1a9944efe082c870587642903de0b734caf3896b
Important:
• If the pool coordinator is not running or the toolstack is being restarted, vTPM operations per‑
formed by the user or by Windows in the background might fail.
• After upgrading from Citrix Hypervisor 8.2 CU1, the background maintenance services for GFS2
SRs do not start correctly.
Checksum: b43aeaa6613a4b89d3d907cdb3704e0aca00c4d1122a01f1c4abac116602c2e4
• If you use XenServer 8 preview with a Citrix Virtual Apps and Desktops license, this license is
deprecated and is no longer supported with XenServer 8.
To run a Citrix Virtual Apps and Desktops workload on a XenServer 8 pool, you must get a
XenServer Premium Edition license for all hosts in the pool. For more information, visit the
XenServer website.
XenServer is now an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid Multi‑
Cloud, Citrix Universal MSP, and Citrix Platform License subscriptions for running your Citrix
workloads. Read more.
• XSA‑452 CVE‑2023‑28746
Checksum: 541fac9e361504d8c568fb6c5bbdef2442d5674ea5e17a2f1cf999c51e5b0608
Note:
Before applying these updates, update your XenCenter to version 2024.1.0 or later. The latest
version of XenCenter is available at https://xenserver.com/downloads.
• The “preview”label has been removed from the Windows 11 template. This guest operating
system is ready to be fully supported when XenServer 8 moves from preview to fully supported
in production.
• When collecting host and guest performance statistics, the collected RRD files are often not up‑
to‑date.
• In XenServer 8 clusters with GFS2 SRs, when collecting the XenServer databases, the cluster
daemon database is not collected.
• When collecting a server status report, if you request a full bug‑report archive and the file size
limit of a database for xcp‑rrdd‑plugins is exceeded, the logfiles of xcp‑rrdd‑plugin are not col‑
lected.
• When collecting a server status report, if you use SSH login:
– The interactive mode where you confirm individual files for collection does not work with‑
out specific user input.
– When downloading uncompressed RRD data with a deprecated method, the VM RRDs are
not collected.
• CVE‑2023‑45230 ‑ Buffer overflow in the DHCPv6 client via a long Server ID option.
• CVE‑2023‑45231 ‑ Out of Bounds read when handling a ND Redirect message with truncated
options.
• CVE‑2023‑45232 ‑ Infinite loop when parsing unknown options in the Destination Options
header.
• CVE‑2023‑45233 ‑ Infinite loop when parsing a PadN option in the Destination Options header.
• CVE‑2023‑45234 ‑ Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise
message.
• CVE‑2023‑45235 ‑ Buffer overflow when handling Server ID option from a DHCPv6 proxy Adver‑
tise message.
• An issue with the use of vTPM while the toolstack is being restarted.
• The status of NIC bonds is not reflected correctly.
• Improvements to the way you apply software updates to your XenServer hosts and pools. For
more information, see Apply updates.
• Update the multipath configuration used for PURE FlashArray SAN to match the vendors recom‑
mendations.
• Improve error messages when file SR types are read‑only.
• Improvements to distributed tracing.
Checksum: 57b11c890cc12413b41310e4aef70b10589b50663ba1f5371e3a70c46bd7fa4d
These updates contain the following new feature:
• Monitor host and dom0 resources with SNMP. This feature can be used from the next version of
XenCenter.
• If you try to enable SR‑IOV on an Intel E810 NIC in XenCenter, the VF assigned to a VM does not
work after the VM boots.
• XSA‑451 CVE‑2023‑46841.
• A migration issue with VMs that previously saw CMP_LEGACY.
Checksum: 4ca53a5e440cd52b4b179b2dfb208e159cf16e918f53130b227eae3fb7b3d596
These updates include the following new feature:
• Add a new check (check_multipath) to the NRPE service to enable monitoring of the multi‑
path status.
• When there are separate independent Target Portal Groups within the IQN, XenServer cannot
log into all iSCSI portals.
• When creating an SMB ISO SR share, it is no longer necessary to supply credentials when con‑
necting to an SMB server that permits guest access.
• Part of the toolstack may unexpectedly stop running.
• You are unable to import a suspended Windows 11 VM that has been exported as an XVA with
power state preservation.
• When a VM with vTPM is started or quickly migrated back and forth between pools, a race con‑
dition can occur.
• pool-eject operations run in parallel can cause TLS verification errors.
• Fixes for several low‑probability issues with GFS2 SRs.
Checksum: bef04584f387457b7665a7f56b3f01be4c03edf67c383875ecbc8ebe92b73786
• Support for UEFI boot and Secure Boot for Linux guest operating systems. For more information,
see Guest UEFI boot and Secure Boot.
• Provide more detailed information about a XenServer host’s SHA256 and SHA1 TLS certificates
in the host console view in XenCenter.
Checksum: a74ad78f7b0537f82cb5069c6b781696829f4053b7a06020ab1436332f684ff1
These updates include security fixes. For more information, see the security bulletin.
Checksum: 1633ab16bf0a6b458c4f863b07328e07ee85371fed34145050552c02e46657da
• Update XenServer VM Tools for Linux to version 8.4.0‑1, available to download from the
XenServer downloads page. From this version, you can use the install.sh script to unin‑
stall XenServer VM Tools for Linux. For more information, see Uninstall XenServer VM Tools for
Linux.
• Ensure that the XenServer welcome message is always displayed when connecting to a
XenServer host console and that the message is correctly line wrapped.
Jan 8, 2024
Checksum: 6240ec0cbc29f6f5204f7f6af7bbce28e96e9dfb9e001a4f0cfa4609214f9d8e
• Sometimes, after migrating a VM from one pool to another, the VM’s alerts are not successfully
copied to the destination pool or removed from the source pool.
• Sometimes the pool database is not restored from the redo‑log (part of the high availability
feature).
Checksum: 95f70cca5fd3b79081c30837352ed941a7d497899062d892fbc2aa51daacfd78
• When using multipathing with Dell EqualLogic PS Series Firmware v7.x, you might see iSCSI
protocol errors.
Checksum: 1633ab16bf0a6b458c4f863b07328e07ee85371fed34145050552c02e46657da
• Sometimes the redo‑log (part of the high availability feature) does not replay all database
writes.
• When running the vdi-copy command to copy a VDI to an SR, XenServer fails to correctly re‑
port the progress of the operation.
• In XenCenter, customizing a template and then exporting and reimporting it can result in the
template failing to import.
Checksum: 4abd37e1e88675bf3793b4704786a97ba43e2a455989546de07f934f20e28135
• The “preview”label has been removed from the Ubuntu 22.04 template. This guest operating
system is ready to be fully supported when XenServer 8 moves from preview to fully supported
in production.
Checksum: 052f8594042ceeb93bbe7d4dd75fc7fcd8af7092c3cd08b2522b6bd2a6694c17
Checksum: 82dc14f34880f471e23467c1cc296bd7b9ca6a670ac71950e6db88019bb47a13
These updates include security fixes. For more information, see the security bulletin.
Nov 6, 2023
Checksum: 4d516d4b6c72eb3be4f60e78371db5fde8b6292395ddaf411faf52507f22f516
• Deploying Windows using PXE boot and Configuration Manager can cause Windows to hang.
• If time synchronization is disabled, Windows VMs do not return the correct time.
• UEFI boot mode Windows VMs now show the Windows logo during boot instead of the Tianocore
logo.
Checksum: 85e8edbaf7469a29cc56fe6880e93c2618fb90002d2d4cdf0b372719413c4525
These updates include general fixes and improvements.
Checkcum: 7623587c09c7198237bc9dd673fba33307fbaee18e0baec50c1e2ddbee165b91
These updates contain the following new feature:
• These updates include support for the following guest operating systems:
– Debian Bookworm 12
– Rocky Linux 9
– CentOS Stream 9
Note:
Customers who wish to use these guest operating systems must also install XenServer VM
Tools for Linux v8.3.1‑1 or later, available to download from the XenServer product down‑
loads page.
Checksum: 0ab01aa0c5623b52219b279b48f6b13f8db4a0a699a25b61a7aa35b39243ca89
These updates include security fixes. For more information, see the security bulletin.
Oct 5, 2023
Checksum: 7ef0331921b2d46b882efa76ea9d6a4c287868dd9a3b0eae4a6d15ba2cf29fbe
These updates include support for the Red Hat Enterprise Linux 9 operating system. Refer to the Red
Hat Enterprise Linux 9 release notes for further technical information.
Note:
Customers who wish to use this guest OS must also install Citrix VM Tools for Linux v8.3.1‑1 or
later, available to download from the XenServer product downloads page.
• Enable interrupt balancing for Fibre Channel (FC) PCI devices. This improves performance on
fast FC HBA SRs, especially if multipathing is used.
• Fix for AMD errata #1474. Disable C6 after 1000 days of uptime on AMD Zen2 systems to avoid a
crash at ~1044 days.
Sep 4, 2023
• Performance metrics are not available for GFS2 SRs and disks on these SRs.
• You cannot snapshot or checkpoint a suspended VM if that VM has a vTPM attached.
• If a XenServer host crashes, or shuts down abruptly, starting more Windows 11 VMs or migrating
more Windows 11 VMs onto that host eventually fails.
• If, when iSCSI SRs are attached, not all the possible paths are available (for example, an offline
controller remote port is down), the SR does not have additional iSCSI sessions added when
those remote ports are accessible again.
Fixed issues
June 4, 2024
The following issues have been fixed in XenServer 8. In addition to these fixed issues, additional fixes
are released on the Normal and Early Access update channels.
General
• Rebooting the VM does not have the same effect as powering off and then starting the VM. (CA‑
188042)
• If an Active Directory user inherits the pool admin role from an AD group that has spaces in its
name, the user cannot log in to XenServer 8 through SSH. (CA‑363207)
• In clustered pools, a network outage might cause the following issues: inability to reconnect to
the GFS2 storage after a host reboot, inability to add or remove hosts in a pool, difficulties in
managing the pool. (XSI‑1386)
Graphics
• On hardware with NVIDIA A16/A2 graphics cards, VMs with vGPUs can sometimes fail to migrate
with the internal error “Gpumon_interface.Gpumon_error([S(Internal_error);S((Failure “No
vGPU available”))])”. (CA‑374118)
Guests
Windows guests
• When UEFI‑boot Windows VMs start, they show a TianoCore logo. (CP‑30146)
• On a Windows VM, sometimes the IP address of an SR‑IOV VIF is not visible in XenCenter. (CA‑
340227)
• On a Windows VM with more than 8 vCPUs, Receive Side Scaling might not work because the
xenvif driver fails to set up the indirection table. (CA‑355277)
• If a XenServer host crashes, or shuts down abruptly, starting more Windows 11 VMs or migrating
more Windows 11 VMs onto that host eventually fails. (CA‑375992)
Linux guests
• The XenServer VM Tools for Linux can provide an incorrect value for the free memory of the VM
that is higher than the correct value. (CA‑352996)
Installation
• [Fixed in the June 2024 ISO release] Due to an incompatibility with some system firmware, in‑
stalling XenServer using software boot‑from‑iSCSI can fail with the error message: “An unrecov‑
erable error has occurred.”
Storage
• When attaching an iSCSI LVM SR with multi‑target and wildcard targetIQNs to a host, the attach
operation can fail if not all targets respond. (CA‑375968)
• If a GFS2 SR has less than 500 MB of space on it, when you attempt to delete disks stored on this
SR, the operation can fail. (CA‑379589)
• When attempting to repair a connection to a read‑only NFS v3 SR, the operation can fail on the
first attempt with the error “SM has thrown a generic python exception”. To work around this
issue, attempt the repair operation again. This issue is caused by a write operation in the initial
repair attempt. (XSI‑1374)
Updates
• While the install update is in progress on a pool member, you might see the error “The operation
could not be performed because getting updates is in progress.”. To resolve this error, you can
retry the operation. (CA‑381215)
Workload Balancing
• For a Workload Balancing virtual appliance version 8.2.2 and later that doesn’t use LVM, you
cannot extend the available disk space. (CA‑358817)
• In XenCenter, the date range showed on the Workload Balancing Pool Audit Report is incorrect.
(CA‑357115)
• During the Workload Balancing maintenance window, Workload Balancing is unable to provide
placement recommendations. When this situation occurs, you see the error: “4010 Pool discov‑
ery has not been completed. Using original algorithm.”The Workload Balancing maintenance
window is less than 20 minutes long and by default is scheduled at midnight. (CA‑359926)
XenCenter
For information about known and fixed issues in XenCenter, see XenCenter What’s New.
Known issues
September 5, 2024
This article contains advisories and minor issues in the XenServer 8 release and any workarounds that
you can apply.
General
• The backup and restore capability in xsconsole is temporarily not available. We are actively
investigating a replacement solution. (CP‑48776)
• When attempting to use the serial console to connect to a XenServer host, the serial console
might refuse to accept keyboard input. If you wait until after the console refreshes twice, the
console then accepts keyboard input. (CA‑311613)
• When read caching is enabled, it is slower to read from the parent snapshot than from the leaf.
(CP‑32853)
• When attempting to log in to the dom0 console with an incorrect password, you receive the
following error message: When trying to update a password, this return
status indicates that the value provided as the current password
is not correct. This error message is expected even though it relates to a password
change, not a login. Try to log in with the correct password. (CA‑356441)
• If a XenServer host is powered off unexpectedly and restarted, when it attempts to recover VMs
that had an attached vTPM, the vTPM can sometimes be missing from the VM. (CA‑379928)
Graphics
• When NVIDIA T4 added in pass‑through mode to a VM on some specific server hardware, that
VM might not power on. (CA‑360450)
• You cannot install the NVIDIA Virtual GPU Manager supplemental pack as part of a fresh instal‑
lation of your XenServer host. After you have installed your hosts, you can install NVIDIA Virtual
GPU Manager by using the xe CLI or XenCenter. For more information, see Install the NVIDIA
vGPU Manager for XenServer.
Guests
• If you attempt to live migrate a VM with dynamic memory control enabled to a target host where
resources such as memory are very constrained, the migration can sometimes fail. (CA‑380607)
Windows guests
• For domain‑joined Windows 10 VMs (1903 and later) with FireEye Agent installed, repeated suc‑
cessful RDP connections can cause the VM to freeze with 100% CPU usage in ntoskrnl.exe.
Perform a hard reboot on the VM to recover from this state. (CA‑323760)
• When you create a UEFI VM, the Windows installation requires a key press to start. If you do not
press a key during the required period, the VM console switches to the UEFI shell.
To work around this issue, you can restart the installation process in one of the following ways:
1 EFI:
2 EFI\BOOT\BOOTX64
– Reboot the VM
When the installation process restarts, watch the VM console for the installation prompt. When
the prompt appears, press any key. (CA‑333694)
• When attempting to update a Windows 10 VM from 1909 to 20H2 or later, the update might fail
with a blue screen showing the error: INACCESSIBLE BOOT DEVICE. (XSI‑1075)
To make it less likely that this failure occurs, you can take the following steps before attempting
to update:
1. Update the XenServer VM Tools for Windows on your VM to the latest version.
2. Snapshot the VM.
3. In the VM registry, delete the following values from the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControl
key: ActiveDeviceID, ActiveInstanceID, and ActiveLocationInformation
• When creating a Windows VM from a template that is set to not automatically update its dri‑
vers, the created VM is incorrectly set to update its drivers. To work around this issue, run
the following command: xe pool-param-set policy-no-vendor-device=true
uuid=<pool-uuid>. This command ensures that future VMs created from the template are
correctly set to not automatically update drivers. VMs that were previously generated from the
template are not changed. (CA‑371529)
Linux guests
• You cannot use the Dynamic Memory Control (DMC) feature on Red Hat Enterprise Linux 8, Red
Hat Enterprise Linux 9, Rocky Linux 8, Rocky Linux 9, or CentOS Stream 9 VMs as these operating
systems do not support memory ballooning with the Xen hypervisor. (CA‑378797)
• On some Linux VMs, especially busy systems with outstanding disk I/O, attempts to suspend
or live migrate the VM might fail. To work around this issue, try increasing the value of /sys/
power/pm_freeze_timeout, for example, to 300000. If this work around is not successful,
you can upgrade the Linux kernel of the VM to the latest version. (CP‑41455)
• If you install Debian 10 (Buster) by using PXE network boot, do not add console=tty0 to
the boot parameters. This parameter can cause issues with the installation process. Use only
console=hvc0 in the boot parameters. (CA‑329015)
• Due to a known issue with some SUSE Linux operating systems, if you attempt to trigger a crash
dump on a SUSE Linux VM with 32 or more vCPUs, the operation fails and the VM does not restart
automatically. This issue affects the following operating systems: SUSE Linux Enterprise Server
15 SP1, 15 SP2, 15 SP3, 15 SP4. (CA‑375759)
• If you create a VM with RHEL 8.7 or earlier and only 1 vCPU, the VM times out while booting. To
work around this issue, use RHEL 8.8 or later or change the number of vCPUs to be 2 or more.
(CA‑376921)
Installation
• When upgrading to or installing XenServer 8 from an ISO located on an IIS server, the install or
upgrade can fail and leave your hosts unable to restart. The remote console shows the GRUB
error: “File ‘/boot/grub/i3860pc/normal.mod’not found. Entering rescue mode”. This issue is
caused by the IIS configuration causing package files to be missing. To work around this issue,
ensure that double escaping is allowed on IIS before extracting the installation ISO on it. (XSI‑
1063)
• Use the latest XenCenter to upgrade from Citrix Hypervisor 8.2 CU1 to XenServer 8. Using an
older version of XenCenter can result in a loss of connectivity.
Download the latest XenCenter from the XenServer product downloads page.
Internationalization
• Non‑ASCII characters, for example, characters with accents, cannot be used in the host console.
(CA‑40845)
• In a Windows VM with XenServer VM Tools for Windows installed, copy and paste of double‑byte
characters can fail if using the default desktop console in XenCenter. The pasted characters
appear as question marks (?).
To work around this issue, you can use the remote desktop console instead. (CA‑281807)
SDK
• In the Java SDK, some calls might fail with a JsonMappingException. (CA‑393866)
Storage
• If you create a new installation of XenServer on a host with a local XFS SR on an NVMe
device, your local storage does not attach on boot. The action fails with the error: “Raised
Server_error(SR_BACKEND_FAILURE, [ FileNotFoundError; [Errno 2] No such file or directory:
‘/sys/block/nvme0n/queue/scheduler’])”.
After applying the latest updates, you can attach the local storage manually.
• If you use GFS2 SRs and have two hosts in your clustered pool, your cluster can lose quorum
and fence during an upgrade. To avoid this situation, either add a host to or remove a host from
your cluster. Ensure that you have either one or three hosts in your pool during the upgrade
process. (CA‑313222)
• If you are using a GFS2 SR and your cluster network is on a non‑management VLAN, you cannot
add or remove hosts to your clustered pool. (XSI‑1604)
• After removing an HBA LUN from a SAN, you might see log messages and I/O failures when query‑
ing Logical Volume information. To work around this issue, reboot the XenServer host. (XSI‑984)
• You cannot set or change the name of the tmpfs SR used by the PVS‑Accelerator. When the
type is tmpfs, the command xe sr-create disregards the value set for name-label and
instead uses a fixed value. If you attempt to run the command xe sr-param-set to change
the name of the tmpfs SR, you receive the error SCRIPT_MISSING.
• You cannot run more than 200 PVS‑Accelerator‑enabled VMs on a XenServer host. (CP‑39386)
Third‑party
• A limitation in recent SSH clients means that SSH does not work for usernames that contain
any of the following characters: { } []|&. Ensure that your usernames and Active Directory
server names do not contain any of these characters.
XenCenter
For information about known and fixed issues in XenCenter, see XenCenter What’s New.
Deprecation
August 6, 2024
The announcements in this article give you advanced notice of platforms, products, and features that
are being phased out so that you can make timely business decisions. We monitor customer use and
feedback to determine when they are withdrawn. Announcements can change in subsequent releases
and might not include every deprecated feature or functionality.
For details about product lifecycle support, see the XenServer lifecycle article.
The following table shows the platforms, products, and features that are deprecated or removed.
Deprecated items are not removed immediately. We continue to support them in the current release,
but they will be removed in a future release.
Deprecation
Item announced in Removed in Alternative
Deprecation
Item announced in Removed in Alternative
Deprecation
Item announced in Removed in Alternative
Deprecation
Item announced in Removed in Alternative
Transfer VM 8.2 CU1 8.2 CU1 (XenCenter Use the latest release
8.2.3) of XenCenter. Since
XenCenter 8.2.3, the
mechanism used for
OVF/OVA
import/export and
single disk image
import has been
simplified and these
operations are now
performed without
using the Transfer VM.
Measured Boot 8.2 CU1 8.2 CU1
Supplemental Pack
Container 8.2 8.2
Management
Supplemental Pack
Support for 8.2 8.2
Hewlett‑Packard
Integrated Lights‑Out
(iLO)
Support for the 8.2 8.2
following legacy
processors: Xeon E3
/5/7 family -
Sandy Bridge,
Xeon E3/5/7 v2
family - Ivy
Bridge
The 8.2 8.2 Download the
guest-tools.iso XenServer VM Tools for
file included in the Windows or for Linux
XenServer installation from the XenServer
ISO downloads page.
Deprecation
Item announced in Removed in Alternative
Deprecation
Item announced in Removed in Alternative
Deprecation
Item announced in Removed in Alternative
Deprecation
Item announced in Removed in Alternative
Deprecation
Item announced in Removed in Alternative
Notes
The backup and restore capability in xsconsole is temporarily not available. We are actively investi‑
gating a replacement solution.
Health Check
Logs for the Health Check service are retained by Windows for troubleshooting purposes. To remove
these logs, delete them manually from %SystemRoot%\System32\Winevt\Logs on the Win‑
dows machine running XenCenter.
This feature was previously listed as deprecated. The deprecation notice was removed on Jan 30, 2023.
DMC is supported in future releases of XenServer.
The vSwitch Controller is no longer supported. Disconnect the vSwitch Controller from your pool
before attempting to update or upgrade to the latest version of XenServer.
1. In the vSwitch controller user interface, go to the Visibility & Control tab.
2. Locate the pool to disconnect in the All Resource Pools table. The pools in the table are listed
using the IP address of the pool coordinator.
3. Click the cog icon and select Remove Pool.
4. Click Remove to confirm.
After the update or upgrade, the following configuration changes take place:
After update or upgrade, if you find any leftover state about the vSwitch Controller in your pool, clear
the state with the following CLI command: xe pool-set-vswitch-controller address=
Quick start
This article steps through how to install and configure XenServer (formerly Citrix Hypervisor) and its
graphical, Windows‑based user interface, XenCenter. After installation, it takes you through creating
Windows virtual machines (VMs) and then making customized VM templates you can use to create
multiple, similar VMs quickly. Finally, this article shows how to create a pool of hosts, which provides
the foundation to migrate running VMs between hosts using live migration.
Focusing on the most basic scenarios, this article aims to get you set up quickly.
This article is primarily intended for new users of XenServer and XenCenter. It is intended for those
users who want to administer XenServer by using XenCenter. For information on how to administer
XenServer using the Linux‑based xe
commands through the XenServer command line interface (known as the xe CLI), see Command‑line
interface.
• Virtual Machine (VM): a computer composed entirely of software that can run its own operating
system and applications as if it were a physical computer. A VM behaves exactly like a physical
computer and contains its own virtual (software‑based) CPU, RAM, hard disk, and NIC.
• Pool: a single managed entity that binds together multiple XenServer hosts and their VMs.
• Pool coordinator (formerly pool master): main host in a pool that provides a single point of con‑
tact for all hosts in the pool, routing communication to other members of the pool as necessary.
• Storage Repository (SR): a storage container in which virtual disks are stored.
Major components
XenServer
XenServer is a complete server virtualization platform, with all the capabilities required to create and
manage a virtual infrastructure. XenServer is optimized for both Windows and Linux virtual servers.
XenServer runs directly on server hardware without requiring an underlying operating system, which
results in an efficient and scalable system. XenServer abstracts elements from the physical machine
(such as hard drives, resources, and ports) and allocating them to the virtual machines (VMs) running
on it.
XenServer lets you create VMs, take VM disk snapshots, and manage VM workloads.
XenCenter
XenCenter is a graphical, Windows‑based user interface. XenCenter enables you to manage XenServer
hosts, pools, and shared storage. Use XenCenter to deploy, manage, and monitor VMs from your Win‑
dows desktop machine.
The XenCenter Online Help is also a great resource for getting started with XenCenter. Press F1 at any
time to access context‑sensitive information.
Requirements
The XenServer host computer is dedicated entirely to the task of running XenServer and hosting VMs,
and is not used for other applications. The computer that runs XenCenter can be any general‑purpose
Windows computer that satisfies the hardware requirements. You can use this computer to run other
applications too. For more information, see System Requirements.
You can download the installation files from XenServer Downloads.
Tip:
Press F12 to advance quickly to the next installer screen. For general help, press F1.
For information about using HTTP, FTP, or NFS as your installation source, see Install
XenServer.
2. Back up data you want to preserve. Installing XenServer overwrites data on any hard drives that
you select to use for the installation.
5. Boot from the local installation media (if necessary, see your hardware vendor documentation
for information on changing the boot order).
6. Following the initial boot messages and the Welcome to XenServer screen, select your key‑
board layout for the installation.
Note:
If you see a System Hardware warning, ensure hardware virtualization assist support is
enabled in your system firmware.
10. If you have multiple hard disks, choose a Primary Disk for the installation. Select Ok.
Choose which disks you want to use for virtual machine storage. Choose Ok.
13. Create and confirm a root password, which the XenCenter application uses to connect to the
XenServer host.
If your computer has multiple NICs, select the NIC which you want to use for management traffic
(typically the first NIC).
15. Configure the Management NIC IP address with a static IP address or use DHCP.
16. Specify the host name and the DNS configuration manually or automatically through DHCP.
If you manually configure the DNS, enter the IP addresses of your primary (required), secondary
(optional), and tertiary (optional) DNS servers in the fields provided.
18. Specify how you want the host to determine local time: using NTP or manual time entry. Choose
Ok.
• If using NTP, you can specify whether DHCP sets the time server. Alternatively, you can
enter at least one NTP host name or IP address in the following fields.
• If you selected to set the date and time manually, you are prompted to do so.
20. The next screen asks if you want to install any supplemental packs. Choose No to continue.
21. From the Installation Complete screen, eject the installation media, and then select Ok to re‑
boot the host.
After the host reboots, XenServer displays xsconsole, a system configuration console.
Note:
Make note of the IP address displayed. You use this IP address when you connect XenCen‑
ter to the host.
Install XenCenter
XenCenter is typically installed on your local system. You can download the XenCenter installer from
the XenServer downloads page
To install XenCenter:
1. Download or transfer the XenCenter installer to the computer that you want to run XenCenter.
3. Follow the Setup wizard, which allows you to modify the default destination folder and then to
install XenCenter.
1. Launch XenCenter.
2. Click the Add New Server icon to open the Add New Server dialog box.
3. In the Server field, enter the IP address of the host. Enter the root user name and password that
you set during XenServer installation. Choose Add.
Note:
The first time you add a host to XenCenter, the following dialog boxes appear:
• Save and Restore Connection State ‑ This dialog box enables you to set your preferences
for storing your host connection information and automatically restoring host connections.
• New Security Certificate ‑ This dialog box enables you to view the security certificate of the
host you are adding to XenCenter. To ensure that you are connecting to the legitimate host,
compare the TLS key fingerprint displayed in the certificate details to the TLS key fingerprint
obtained directly from the physical host.
License XenServer
You can use XenServer without a license (Trial Edition). The Trial Edition lets you try Premium Edition
features, but in a restricted size pool of up to 3 hosts.
If you are using XenServer to run your Citrix Virtual Apps and Desktops workloads, you must have a
Premium Edition license. For more information about getting a XenServer license, see the XenServer
website. XenServer is now an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid Multi‑
Cloud, Citrix Universal MSP, and Citrix Platform License subscriptions for running your Citrix work‑
loads. Read more.
If you have a XenServer license, apply it now. For more information, see Licensing.
A resource pool is composed of multiple XenServer host installations, bound together as a single man‑
aged entity.
Resource pools enable you to view multiple hosts and their connected shared storage as a single uni‑
fied resource. You can flexibly deploy VMs across the resource pool based on resource needs and
business priorities. A pool can contain up to 64 hosts running the same version of XenServer software,
at the same patch level, and with broadly compatible hardware.
One host in the pool is designated as the pool coordinator. The pool coordinator provides a single
point of contact for the whole pool, routing communication to other members of the pool as necessary.
Every member of a resource pool contains all the information necessary to take over the role of pool
coordinator if necessary. The pool coordinator is the first host listed for the pool in the XenCenter
Resources pane. You can find the pool coordinator’s IP address by selecting the pool coordinator and
clicking the Search tab.
In a pool with shared storage, you can start VMs on any pool member that has sufficient memory
and dynamically move the VMs between hosts. The VMs are moved while running and with minimal
downtime. If an individual XenServer host suffers a hardware failure, you can restart the failed VMs
on another host in the same pool.
If the high availability feature is enabled, protected VMs are automatically moved if a host fails. On an
HA‑enabled pool, a new pool coordinator is automatically nominated if the pool coordinator is shut
down.
Note:
For a description of heterogeneous pool technology, see Hosts and resource pools.
While XenServer accommodates many shared storage solutions, this section focuses on two common
types: NFS and iSCSI.
Requirements
To create a pool with shared storage, you need the following items:
To get you started quickly, this section focuses on creating homogeneous pools. Within a homoge‑
neous pool, all hosts must have compatible processors and be running the same version of XenServer,
under the same type of XenServer product license. For a full list of homogeneous pool requirements,
see System requirements.
Create a pool
To create a pool:
3. Nominate the pool coordinator by selecting a host from the Coordinator list.
4. Select the second host to place in the new pool from the Additional members list.
When you install XenServer, you create a network connection, typically on the first NIC in the pool
where you specified an IP address (during XenServer installation).
However, you may need to connect your pool to VLANs and other physical networks. To do so, you
must add these networks to the pool. You can configure XenServer to connect each NIC to one physical
network and numerous VLANs.
For detailed information about networking configuration, see Create networks in resource pools.
Before creating networks, ensure that the cabling matches on each host in the pool. Plug the NICs on
each host into the same physical networks as the corresponding NICs on the other pool members.
Note:
If the NICs were not plugged in to the NICs on the host when you installed XenServer:
For additional information about configuring XenServer networking, see Networking and About
XenServer Networks.
4. On the Select Type page, select External Network, and click Next.
5. On the Name page, enter a meaningful name for the network and description.
• NIC: Select the NIC that you want XenServer to use to send and receive data from the net‑
work.
• MTU: If the network uses jumbo frames, enter a value for the Maximum Transmission Unit
(MTU) between 1500 to 9216. Otherwise, leave the MTU box at its default value of 1500.
If you configure many virtual machines to use this network, you can select the Automatically
add this network to new virtual machines check box. This option adds the network by de‑
fault.
7. Click Finish.
Bonding NICs
NIC bonding can make your host more resilient by using two or more physical NICs as if they were
a single, high‑performing channel. This section only provides a very brief overview of bonding, also
known as NIC teaming. Before configuring bonds for use in a production environment, we recommend
reading more in‑depth information about bonding. For more information, see Networking.
XenServer supports the following bond modes: Active/active, active/passive (active/backup), and
LACP. Active/active provides load balancing and redundancy for VM‑based traffic. For other types
of traffic (storage and management), active/active cannot load balance traffic. As a result, LACP or
multipathing are better choice for storage traffic. For information about multipathing, see Storage.
For more information about bonding, see Networking.
LACP options are not visible or available unless you configure the vSwitch as the network stack. Like‑
wise, your switches must support the IEEE 802.3ad standard. The switch must contain a separate LAG
group configured for each LACP bond on the host. For more details about creating LAG groups, see
Networking.
To bond NICs:
1. Ensure that the NICs you want to bind together are not in use: shut down any VMs with virtual
network interfaces using these NICs before creating the bond. After you have created the bond,
reconnect the virtual network interfaces to an appropriate network.
2. Select the host in the Resources pane then open the NICs tab and click Create Bond.
3. Select the NICs you want to bond together. To select a NIC, select its check box in the list. Up
to four NICs may be selected in this list. Clear the check box to deselect a NIC. To maintain a
flexible and secure network, you can bond either two, three, or four NICs when vSwitch is the
network stack. However, you can only bond two NICs when Linux bridge is the network stack.
• Select Active‑passive to configure an active‑passive bond. Traffic passes over only one of
the bonded NICs. In this mode, the second NIC only becomes active if the active NIC fails,
for example, if it loses network connectivity.
• Select LACP with load balancing based on source MAC address to configure a LACP bond.
The outgoing NIC is selected based on MAC address of the VM from which the traffic origi‑
nated. Use this option to balance traffic in an environment where you have several VMs on
the same host. This option is not suitable if there are fewer virtual interfaces (VIFs) than
NICs: as load balancing is not optimal because the traffic cannot be split across NICs.
• Select LACP with load balancing based on IP and port of source and destination to con‑
figure a LACP bond. The source IP address, source port number, destination IP address,
and destination port number are used to allocate the traffic across the NICs. Use this op‑
tion to balance traffic from VMs in an environment where the number of NICs exceeds the
number of VIFs.
Note:
LACP bonding is only available for the vSwitch, whereas active‑active and active‑
passive bonding modes are available for both the vSwitch and Linux bridge. For
information about networking stacks, see Networking.
5. To use jumbo frames, set the Maximum Transmission Unit (MTU) to a value between 1500 to
9216.
6. To have the new bonded network automatically added to any new VMs created using the New
VM wizard, select the check box.
7. Click Create to create the NIC bond and close the dialog box.
To connect the hosts in a pool to a remote storage array, create a XenServer SR. The SR is the storage
container where a VM’s virtual disks are stored. SRs are persistent, on‑disk objects that exist indepen‑
dently of XenServer. SRs can exist on different types of physical storage devices, both internal and
external. These types include local disk devices and shared network storage.
You can configure a XenServer SR for various different types of storage, including:
• NFS
• Software iSCSI
• Hardware HBA
• SMB
• Fibre Channel
This section steps through setting up two types of shared SRs for a pool of hosts: NFS and iSCSI. Be‑
fore you create an SR, configure your NFS or iSCSI storage array. Setup differs depending on the type
of storage solution that you use. For more information, see your vendor documentation. Generally,
before you begin, complete the following setup for your storage solution:
• iSCSI SR: You must have created a volume and a LUN on the storage array.
• NFS SR: You must have created the volume on the storage device.
• Hardware HBA: You must have done the configuration required to expose the LUN before run‑
ning the New Storage Repository wizard
• Software FCoE SR: You must have manually completed the configuration required to expose
a LUN to the host. This setup includes configuring the FCoE fabric and allocating LUNs to your
SAN’s public world wide name (PWWN).
If you are creating an SR for IP‑based storage (iSCSI or NFS), you can configure one of the following
as the storage network: the NIC that handles the management traffic or a new NIC for the storage
traffic. To configure a different a NIC for storage traffic, assign an IP address to a NIC by creating a
management interface.
When you create a management interface, you must assign it an IP address that meets the following
criteria:
1. Ensure that the NIC is on a separate subnet or that routing is configured to suit your network
topology. This configuration forces the desired traffic over the selected NIC.
2. In the Resource pane of XenCenter, select the pool (or standalone host). Click the Networking
tab, and then click the Configure button.
3. In the Configure IP Address dialog, in the left pane, click Add IP address.
4. Give the new interface a meaningful name (for example, yourstoragearray_network). Select the
Network associated with the NIC that you use for storage traffic.
5. Click Use these network settings. Enter a static IP address that you want to configure on the
NIC, the subnet mask, and gateway. Click OK. The IP address must be on the same subnet as
the storage controller the NIC is connected to.
Note:
Whenever you assign a NIC an IP address, it must be on a different subnet than any other NICs
with IP addresses in the pool. This includes the primary management interface.
1. On the Resources pane, select the pool. On the toolbar, click the New Storage button.
2. Under Virtual disk storage, choose NFS or iSCSI as the storage type. Click Next to continue.
a) Enter a name for the new SR and the name of the share where it is located. Click Scan to
have the wizard scan for existing NFS SRs in the specified location.
Note:
The NFS host must be configured to export the specified path to all XenServer hosts
in the pool.
b) Click Finish.
a) Enter a name for the new SR and then the IP address or DNS name of the iSCSI target.
Note:
The iSCSI storage target must be configured to enable every XenServer host in the
pool to have access to one or more LUNs.
b) If you have configured the iSCSI target to use CHAP authentication, enter the user name
and password.
c) Click the Scan Target Host button, and then choose the iSCSI target IQN from the Target
IQN list.
Warning:
The iSCSI target and all hosts in the pool must have unique IQNs.
d) Click Target LUN, and then select the LUN on which to create the SR from the Target LUN
list.
Warning:
Each individual iSCSI storage repository must be contained entirely on a single LUN
and cannot span more than one LUN. Any data present on the chosen LUN is de‑
stroyed.
e) Click Finish.
The new shared SR now becomes the default SR for the pool.
Through XenCenter, you can create virtual machines in various ways, according to your needs.
Whether you are deploying individual VMs with distinct configurations or groups of multiple, similar
VMs, XenCenter gets you up and running in just a few steps.
XenServer also provides an easy way to convert batches of virtual machines from VMware. For more
information, see Conversion Manager.
This section focuses on a few methods by which to create Windows VMs. To get started quickly, the
procedures use the simplest setup of XenServer: a single XenServer host with local storage (after you
connect XenCenter to the XenServer host, storage is automatically configured on the local disk of the
host).
This section also demonstrates how to use live migration to live migrate VMs between hosts in the
pool.
After explaining how to create and customize your new VM, this section demonstrates how to convert
that existing VM into a VM template. A VM template preserves your customization so you can always
use it to create VMs to the same (or to similar) specifications. It also reduces the time taken to create
multiple VMs.
You can also create a VM template from a snapshot of an existing VM. A snapshot is a record of a running
VM at a point in time. It saves the storage, configuration, and networking information of the original
VM, which makes it useful for backup purposes. Snapshots provide a fast way to make VM templates.
This section demonstrates how to take a snapshot of an existing VM and then how to convert that
snapshot into a VM template. Finally, this section describes how to create VMs from a VM template.
• Create a Windows 10 VM
• Install XenServer VM Tools for Windows
• Migrate a running VM between hosts in the pool
• Create a VM template
• Create a VM from a VM template
Requirements
To create a pool with shared storage, you need the following items:
Create a Windows 10 VM
Note:
The following procedure provides an example of creating Windows 10 VM. The default values may
vary depending on the operating system that you choose.
1. On the toolbar, click the New VM button to open the New VM wizard.
The New VM wizard allows you to configure the new VM, adjusting various parameters for CPU,
storage, and networking resources.
Each template contains the setup information for creating a VM with a specific guest operating
system (OS), and with optimum storage. This list reflects the templates that XenServer currently
supports.
Note:
If the OS you’re installing on your new VM is compatible only with the original hardware,
check the Copy host BIOS strings to VM box. For example, use this option for an OS in‑
stallation CD that was packaged with a specific computer.
After you first start a VM, you cannot change its BIOS strings. Ensure that the BIOS strings
are correct before starting the VM for the first time.
Installing from a CD/DVD is the simplest option for getting started. Choose the default instal‑
lation source option (DVD drive), insert the disk into the DVD drive of the XenServer host, and
choose Next to proceed.
XenServer also allows you to pull OS installation media from a range of sources, including a
pre‑existing ISO library.
To attach a pre‑existing ISO library, click New ISO library and indicate the location and type of
ISO library. You can then choose the specific operating system ISO media from the list.
Each OS has different configuration requirements which are reflected in the templates. You can
choose to modify the defaults if necessary. Click Next to continue.
The New VM wizard prompts you to assign a dedicated GPU or virtual GPUs to the VM. This
option enables the VM to use the processing power of the GPU. It provides better support for
high‑end 3D professional graphics applications such as CAD, GIS, and Medical Imaging applica‑
tions.
Note:
Click Next to select the default allocation and configuration, or you might want to:
a) Change the name, description, or size of your virtual disk by clicking Edit.
Note:
When you create a pool of XenServer hosts, you can configure shared storage at this point
when creating a VM.
Click Next to select the default NIC and configurations, including an automatically created
unique MAC address for each NIC, or you can:
a) Change the physical network, MAC address, or Quality of Service (QoS) priority of the vir‑
tual disk by clicking Edit.
XenServer uses the virtual network interface to connect to the physical network on the
host. Be sure to select the network that corresponds with the network the virtual machine
requires. To add a physical network, see Setting Up Networks for the Pool.
10. Review settings, and then click Create Now to create the VM and return to the Search tab.
An icon for your new VM appears under the host in the Resources pane.
On the Resources pane, select the VM, and then click the Console tab to see the VM console.
12. After the OS installation completes and the VM reboots, install the XenServer VM Tools for Win‑
dows.
XenServer VM Tools for Windows provide high performance I/O services without the overhead of tra‑
ditional device emulation. XenServer VM Tools for Windows consists of I/O drivers (also known as
paravirtualized drivers or PV drivers) and the Management Agent. XenServer VM Tools for Windows
must be installed on each Windows VM for the VM to have a fully supported configuration. A Windows
VM functions without them, but performance is hampered. XenServer VM Tools for Windows also en‑
able certain functions and features, including cleanly shutting down, rebooting, suspending and live
migrating VMs.
Warning:
Install XenServer VM Tools for Windows for each Windows VM. Running Windows VMs without
XenServer VM Tools for Windows is not supported.
We recommend that you snapshot your VM before installing or updating the XenServer VM Tools.
1. Download the XenServer VM Tools for Windows file onto your Windows VM. Get this file from the
XenServer downloads page.
Note:
I/O drivers are automatically installed on a Windows VM that can receive updates from Windows
Update. However, we recommend that you install the XenServer VM Tools for Windows pack‑
age to install the Management Agent, and to maintain a supported configuration. The following
features are available only for XenServer Premium Edition customers:
After you have installed the XenServer VM Tools for Windows, you can customize your VM by installing
applications and performing any other configurations. If you want to create multiple VMs with similar
specifications, you can do so quickly by making a template from the existing VM. Use that template to
create VMs. For more information, see Creating VM Templates.
Using live migration, you can move a running VM from one host to another in the same pool, and with
virtually no service interruption. Where you decide to migrate a VM to depends on how you configure
the VM and pool.
Note:
Ensure that the VM you migrate does not have local storage.
2. Right‑click the VM icon, point to Migrate to Server, and then select the new VM host.
Tip:
3. The migrated VM displays under the new host in the Resources pane.
Create VM templates
There are various ways to create a VM template from an existing Windows VM, each with its individual
benefits. This section focuses on two methods: converting an existing VM into a template, and cre‑
ating a template from a snapshot of a VM. In both cases, the VM template preserves the customized
configuration of the original VM or VM snapshot. The template can then be used to create new, similar
VMs quickly. This section demonstrates how to make new VMs from these templates.
Before you create a template from an existing VM or VM snapshot, we recommend that you run the Win‑
dows utility Sysprep on the original VM. In general, running Sysprep prepares an operating system
for disk cloning and restoration. Windows OS installations include many unique elements per installa‑
tion (including Security Identifiers and computer names). These elements must stay unique and not
be copied to new VMs. If copied, confusion and problems are likely to arise. Running Sysprep avoids
these problems by allowing the generation of new, unique elements for the new VMs.
Note:
Running Sysprep may not be as necessary for basic deployments or test environments as it is
for production environments.
For more information about Sysprep, see your Windows documentation. The detailed procedure of
running this utility can differ depending on the version of Windows installed.
Warning:
When you create a template from an existing VM, the new template replaces the original VM. The
VM no longer exists.
2. On the Resources pane, right‑click the VM, and select Convert to Template.
Once you create the template, the new VM template appears in the Resources pane, replacing
the existing VM.
1. On the Resources pane, select the VM. Click the Snapshots tab, and then Take Snapshot.
2. Enter a name and an optional description of the new snapshot. Click Take Snapshot.
3. Once the snapshot finishes and the icon displays in the Snapshots tab, select the icon of the
new snapshot. From the Actions list, choose New Template from Snapshot.
1. On the XenCenter Resources pane, right‑click the template, and select New VM wizard.
Note:
When the wizard prompts you for an OS installation media source, select the default and
continue.
If you are using a template created from an existing VM, you can also choose to select Quick Create.
This option does not take you through the New VM wizard. Instead this option instantly creates and
provisions a new VM using all the configuration settings specified in your template.
System requirements
August 6, 2024
XenServer requires at least two separate physical x86 computers: one to be the XenServer host and the
other to run the XenCenter application or the XenServer Command‑Line Interface (CLI). The XenServer
host computer is dedicated entirely to the task of running XenServer and hosting VMs, and is not used
for other applications.
Warning:
XenServer supports only drivers and supplemental packs that are provided by us being installed
directly in the host’s control domain. Drivers provided by third‑party websites, including drivers
with the same name or version number as those we provide, are not supported.
• Drivers that NVIDIA provides to enable vGPU support. For more information, see NVIDIA
vGPU.
Other drivers provided by NVIDIA, for example, the Mellanox drivers, are not supported with
XenServer unless distributed by us.
To run XenCenter use any general‑purpose Windows system that satisfies the hardware requirements.
This Windows system can be used to run other applications.
When you install XenCenter on this system, the XenServer CLI is also installed. A standalone remote
XenServer CLI can be installed on any RPM‑based Linux distribution. For more information, see
Command‑line interface.
Although XenServer is usually deployed on server‑class hardware, XenServer is also compatible with
many models of workstations and laptops. For more information, see the Hardware Compatibility List
(HCL).
The XenServer host must be a 64‑bit x86 server‑class machine devoted to hosting VMs. XenServer
creates an optimized and hardened Linux partition with a Xen‑enabled kernel. This kernel controls
the interaction between the virtualized devices seen by VMs and the physical hardware.
• Up to 6 TB of RAM
• Up to 16 physical NICs
The maximum number of logical processors supported differs by CPU. For more informa‑
tion, see the Hardware Compatibility List (HCL).
CPUs
One or more 64‑bit x86 CPUs, 1.5 GHz minimum, 2 GHz or faster multicore CPU recommended.
To support VMs running Windows or more recent versions of Linux, you require an Intel VT or AMD‑V
64‑bit x86‑based system with one or more CPUs.
Note:
Ensure that you enable hardware support for virtualization on the XenServer host. Virtualiza‑
tion support is an option in your system firmware. It is possible that your hardware might have
virtualization support disabled. For more information, see your server documentation.
To support VMs running supported paravirtualized Linux, you require a standard 64‑bit x86‑based sys‑
tem with one or more CPUs.
RAM
Disk space
• Locally attached storage with 46 GB of disk space minimum, 70 GB of disk space recommended
• SAN via HBA (not through software) when installing with multipath boot from SAN.
For a detailed list of compatible storage solutions, see the Hardware Compatibility List (HCL).
Network
100 Mbit/s or faster NIC. One or more Gb, or 10 Gb NICs is recommended for faster export/import data
transfers and VM live migration.
We recommend that you use multiple NICs for redundancy. The configuration of NICs differs depend‑
ing on the storage type. For more information, see the vendor documentation.
XenServer requires an IPv4 network for management and storage traffic.
Notes:
• Ensure that the time setting on your server is set to the current time in UTC.
• In some support cases, serial console access is required for debug purposes. When setting
up the XenServer configuration, we recommend that you configure serial console access.
For hosts that do not have physical serial port or where suitable physical infrastructure is
not available, investigate whether you can configure an embedded management device.
For more information about setting up serial console access, see CTX228930 ‑ How to Con‑
figure Serial Console Access on XenServer.
• Operating System:
– Windows 10
– Windows 11
– Windows Server 2016
– Windows Server 2019
If you want XenCenter to be able to launch an external SSH console that connects to your server, install
one of the following applications on the system:
• PuTTY
• OpenSSH (installed by default on some Windows operating systems)
For more information, see Configure XenCenter to use an external SSH console.
For a list of supported VM operating systems, see Guest operating system support.
Pool requirements
Hardware requirements
All of the servers in a XenServer resource pool must have broadly compatible CPUs, that is:
• The CPU vendor (Intel, AMD) must be the same on all CPUs on all servers.
Other requirements
In addition to the hardware prerequisites identified previously, there are some other configuration
prerequisites for a host joining a pool:
• It must have a consistent IP address (a static IP address on the host or a static DHCP lease). This
requirement also applies to the servers providing shared NFS or iSCSI storage.
• Its system clock must be synchronized to the pool coordinator (for example, through NTP).
• It cannot have any running or suspended VMs or any active operations in progress on its VMs,
such as shutting down or exporting. Shut down all VMs on the host before adding it to a pool.
• It cannot have a bonded management interface. Reconfigure the management interface and
move it on to a physical NIC before adding the host to the pool. After the host has joined the
pool, you can reconfigure the management interface again.
• It must be running the same version of XenServer, at the same patch level, as hosts already in
the pool.
• It must be configured with the same supplemental packs as the hosts already in the pool. Sup‑
plemental packs are used to install add‑on software into the XenServer control domain, dom0.
To prevent an inconsistent user experience across a pool, all hosts in the pool must have the
same supplemental packs at the same revision installed.
• It must have the same XenServer license as the hosts already in the pool. You can change the
license of any pool members after joining the pool. The host with the lowest license determines
the features available to all members in the pool.
XenServer hosts in resource pools can contain different numbers of physical network interfaces and
have local storage repositories of varying size.
Note:
Servers providing shared NFS or iSCSI storage for the pool must have a static IP address or be
DNS addressable.
Homogeneous pools
A homogeneous resource pool is an aggregate of servers with identical CPUs. CPUs on a server joining
a homogeneous resource pool must have the same vendor, model, and features as the CPUs on servers
already in the pool.
Heterogeneous pools
Heterogeneous pool creation is made possible by using technologies in Intel (FlexMigration) and AMD
(Extended Migration) CPUs that provide CPU masking or leveling. These features allow a CPU to be
configured to appear as providing a different make, model, or feature set than it actually does. These
capabilities enable you to create pools of hosts with different CPUs but still safely support live migra‑
tions.
For information about creating heterogeneous pools, see Hosts and resource pools.
Configuration limits
September 3, 2024
Use the following configuration limits as a guideline when selecting and configuring your virtual and
physical environment for XenServer. The following tested and recommended configuration limits are
fully supported for XenServer.
Factors such as hardware and environment can affect the limitations listed below. More information
about supported hardware can be found on the Hardware Compatibility List. Consult your hardware
manufacturers’documented limits to ensure that you do not exceed the supported configuration lim‑
its for your environment.
Item Limit
Compute
Virtual CPUs per VM (Linux) 32/64 (see note 1)
Virtual CPUs per VM (Windows) 32/64 (see note 1)
Memory
RAM per VM 1.5 TiB (see note 2)
Storage
Virtual Disk Images (VDI) (including CD‑ROM) per 241 (see note 3)
VM
Virtual CD‑ROM drives per VM 1
Virtual Disk Size (NFS) 2040 GiB
Virtual Disk Size (LVM) 2040 GiB
Virtual Disk Size (XFS) 16 TiB
Virtual Disk Size (GFS2) 16 TiB
Networking
Virtual NICs per VM 7 (see note 4)
Graphics Capability
vGPUs per VM 8
Passed through GPUs per VM 1
Devices
Pass‑through USB devices 6
Notes:
1. Consult your guest OS documentation to ensure that you do not exceed the supported lim‑
its. As of yet, Red Hat Enterprise Linux 8 and derivatives do not support more than 32 vCPUs.
Though the limit is 64, we recommend to set the limit to 32 if your VMs might not be trust‑
worthy or if you want to prevent a potential impact on system availability.
2. The maximum amount of physical memory addressable by your operating system varies.
Setting the memory to a level greater than the operating system supported limit may lead
to performance issues within your guest.
3. The maximum number of VDIs supported depends on the guest operating system. Con‑
sult your guest operating system documentation to ensure that you do not exceed the sup‑
ported limits.
4. Several guest operating systems have a lower limit, other guests require installation of the
XenServer VM Tools to achieve this limit.
Item Limit
Compute
Logical processors per host 960 (see note 1)
Concurrent VMs per host 1000 (see note 2)
Concurrent protected VMs per host with HA 500
enabled
Virtual GPU VMs per host 128 (see note 3)
Memory
RAM per host 6 TB
Storage
Concurrent active virtual disks per host 2048 (see note 4)
Storage repositories per host (NFS) 400
Attached VDIs per SR (all types) 600
Item Limit
Networking
Physical NICs per host 16
Physical NICs per network bond 4
Virtual NICs per host 512
VLANs per host 800
Network Bonds per host 4
Graphics Capability
GPUs per host 8 (see note 5)
Notes:
1. The maximum number of logical physical processors supported differs by CPU. For more
information, see the Hardware Compatibility List.
2. The maximum number of VMs per host supported depends on VM workload, system load,
network configuration, and certain environmental factors. We reserve the right to deter‑
mine what specific environmental factors affect the maximum limit at which a system can
function. For larger pools (over 32 hosts), we recommend allocating at least 8GB RAM to the
Control Domain (Dom0). For systems running over 500 VMs or when using the PVS Acceler‑
ator, we recommend allocating at least 16 GB RAM to the Control Domain. For information
about configuring Dom0 memory, see CTX220763 ‑ How to Configure dom0 Memory.
3. For NVIDIA vGPU, 128 vGPU accelerated VMs per host with 4xM60 cards (4x32=128 VMs), or
2xM10 cards (2x64=128 VMs).
4. The number of concurrent active virtual disks per host is also constrained by the number
of SRs you have attached to the host and the number of attached VDIs that are allowed for
each SR (600). For more information, see the “Attached VDIs per SR”entry in the Resource
pool limits.
5. This figure might change. For the current supported limits, see the Hardware Compatibility
List.
Item Limit
Compute
VMs per resource pool 2400
Hosts per resource pool 64 (see note 1)
Networking
VLANs per resource pool 800
Disaster recovery
Integrated site recovery storage repositories per 8
resource pool
Storage
Paths to a LUN 16
Multipathed LUNs per host 150 (see note 2)
Multipathed LUNs per host (used by storage 150 (see note 2)
repositories)
VDIs per SR (NFS, SMB, EXT, XFS, GFS2) 20000 (see note 3)
VDIs per SR (LVM) 1000 (see note 3)
Storage repositories per pool (NFS) 400
Storage repositories per pool (GFS2) 62
Maximum file system size (GFS2) 100 TiB
XenCenter
Concurrent operations per pool 25
Notes:
1. Clustered pools that use GFS2 storage support a maximum of 16 hosts in the resource pool.
2. When HA is enabled, we recommend increasing the default timeout to at least 120 seconds
when more than 30 multipathed LUNs are present on a host. For information about increas‑
ing the HA timeout, see Configure high availability timeout.
3. The VDI count limit includes VDIs used for internal purposes such as snapshot management.
Each snapshot is internally represented as 2 VDIs: one is the snapshot and one is the shared
parent with the active writeable VDI.
Hardware drivers
We collaborate with partner organizations to provide drivers and support for a wide range of hardware.
For more information, see the Hardware Compatibility List.
To support this hardware, your installation of XenServer 8 includes third‑party drivers that have been
certified as compatible with XenServer. A list of the drivers included in‑box with your initial XenServer
installation is given in the summary article Driver versions for XenServer and Citrix Hypervisor.
Updates to drivers
We regularly deliver updated versions of these drivers which can enable new hardware or resolve is‑
sues with existing hardware. Most driver updates are delivered through the updates mechanism. For
more information, see Update your XenServer hosts.
Some driver updates are released as driver disk ISO files on the website https://support.citrix.com.
These drivers are listed in the summary article Driver versions for XenServer and Citrix Hypervisor.
Even though we distribute the drivers and their source code for our customers to use, the hardware
vendor owns the driver source files.
XenServer supports only drivers that are delivered in‑box with the product or are downloaded from
https://support.citrix.com. Drivers provided by third‑party websites, including drivers with the same
name or version number as those drivers provided by us, are not supported.
Note:
The only exception to this restriction are the drivers that NVIDIA provides to enable vGPU support.
For more information, see NVIDIA vGPU.
Other drivers provided by NVIDIA, for example, the Mellanox drivers, are only supported with
XenServer when distributed by us.
Do not download drivers from your hardware vendor website, even if the driver has the same version
number as the one provided by XenServer. These drivers are not supported.
Before a driver can be supported with XenServer, it must be certified with us and released through one
of the approved mechanisms. This certification process ensures that the driver is of a format required
to be installable in a XenServer environment and that it is compatible with XenServer 8.
If your hardware vendor recommends that you install a specific driver version that is not available in‑
box or on the https://support.citrix.com website, request that the vendor contacts us to certify this
version of the driver with XenServer.
We provide the vendors with certification kits that they can use to test updated versions of their drivers
that are required by the shared customer base of Citrix Hypervisor and the hardware vendor. After the
vendor provides us with the certification test results, we validate that those results show no issues or
regressions in the updated version of the driver. The driver version is now certified with XenServer
and we publish the driver our regular updates or as a driver disk ISO on https://support.citrix.com.
For more information about the certification process the vendor must follow, see the article Hardware
Compatibility List explained.
When installing VMs and allocating resources such as memory and disk space, follow the guidelines
of the operating system and any relevant applications.
Note:
1. Customers who wish to use this guest OS must also install XenServer VM Tools for Linux
v8.3.1‑1 or later, available to download from the XenServer product downloads page.
• XenServer VM Tools for Linux is only supported on the Linux guest operating systems listed
above.
• All supported operating systems run in HVM mode.
• Individual versions of the operating systems can also impose their own maximum limits on the
amount of memory supported (for example, for licensing reasons).
• When configuring guest memory, do not to exceed the maximum amount of physical memory
that your operating system can address. Setting a memory maximum that is greater than the
operating system supported limit might lead to stability problems within your guest.
• To create a VM of a newer minor version of RHEL than is listed in the preceding table, use the
following method:
– Install the VM from the latest supported media for the major version
– Use yum update to update the VM to the newer minor version
This approach also applies to RHEL‑based operating systems such as CentOS and Oracle Linux.
• XenServer supports all SKUs (editions) for the listed versions of Windows.
XenServer includes a long‑term guest support (LTS) policy for Linux VMs. The LTS policy enables you
to consume minor version updates by one of the following methods:
The list of supported guest operating systems can contain operating systems that were supported by
their vendors at the time this version of XenServer was released, but are now no longer supported by
their vendors.
We no longer offer support for these operating systems (even if they remain listed in the table of sup‑
ported guests or their templates remain available on your XenServer hosts). While attempting to ad‑
dress and resolve a reported issue, we assess if the issue directly relates to an out‑of‑support operating
system on a VM. To assist in making that determination, we might ask you to attempt to reproduce an
issue using a supported version of the guest operating system. If the issue seems to be related to the
out‑of‑support operating system, we will not investigate the issue further.
Note:
Windows versions that are supported by Microsoft as part of an LTSB branch are supported by
XenServer.
Windows versions that are out of support, but part of an Extended Security Updates (ESU) agree‑
ment are not supported by XenServer.
Connectivity requirements
This article provides an overview of domains and common ports that are used by XenServer compo‑
nents and must be considered as part of the networking architecture, especially if communication
traffic traverses network components such as firewalls or proxy servers where ports must be opened
or domains added to an allow list to ensure communication flow.
Depending on your deployment and requirements, configure your firewall to enable these XenServer
components to access the listed domains.
XenServer hosts
When configuring your XenServer pools to receive updates, you can configure a proxy server for the
pool coordinator to use to download the updates. For more information, see Configure updates for
your pool.
XenCenter
You can configure a proxy server that XenCenter goes through to check for and download updates. For
Windows VMs
If you have set up your Windows VMs to receive updates to the XenServer VM Tools management agent,
your Windows VM accesses the following domains:
If you don’t want your Windows VM to access these domains, you can redirect management agent
updates to an internal web server. For more information, see Redirect the Management Agent up‑
dates.
The ports listed in the following table are the common ports that are used by XenServer components.
Not all ports need to be open, depending on your deployment and requirements.
Other clients XenServer hosts TCP 80, 443 Any client that
uses the
management API
to communicate
with XenServer
hosts
XenServer interoperates with various Citrix products. For more information about the ports these
products use, see Communication ports used by Citrix.
Note:
• To improve security, you can close TCP port 80 on the management interface of XenServer
hosts. For more information about how to close port 80, see Restrict use of port 80.
If you use Active Directory in your environment, ensure that the following firewall ports are open for
outbound traffic for XenServer to access the domain controllers.
53 UDP/TCP DNS
88 UDP/TCP Kerberos 5
123 UDP NTP
137 UDP NetBIOS Name Service
139 TCP NetBIOS Session (SMB)
389 UDP/TCP LDAP
445 TCP SMB over TCP
464 UDP/TCP Machine password changes
636 UDP/TCP LDAP over SSL
3268 TCP Global Catalog Search
If you use Citrix Provisioning Services in your environment, ensure that the following firewall ports
can be accessed:
For more information, see Citrix Provisioning Services and Communication ports used by Citrix.
Technical overview
XenServer (formerly Citrix Hypervisor) is an industry leading platform for cost‑effective desktop,
server, and cloud virtualization infrastructures. XenServer enables organizations of any size or type
to consolidate and transform compute resources into virtual workloads for today’s data center
requirements. Meanwhile, it ensures a seamless pathway for moving workloads to the cloud.
A hypervisor is the basic abstraction layer of software. The hypervisor performs low‑level tasks such
as CPU scheduling and is responsible for memory isolation for resident VMs. The hypervisor abstracts
the hardware for the VMs. The hypervisor has no knowledge of networking, external storage devices,
video, and so on.
Key components
This section gives you a high‑level understanding of how XenServer works. See the following illustra‑
tion for the key components of XenServer:
Hardware
The hardware layer contains the physical server components, such as CPU, memory, network, and
disk drives.
You need an Intel VT or AMD‑V 64‑bit x86‑based system with one or more CPUs to run all supported
guest operating systems. For more information about XenServer host system requirements, see Sys‑
tem requirements.
For a complete list of XenServer certified hardware and systems, see the Hardware Compatibility List
(HCL).
Xen Hypervisor
The Xen Project hypervisor is an open‑source type‑1 or bare‑metal hypervisor. It allows many in‑
stances of an operating system or different operating systems to run in parallel on a single machine
(or host). Xen hypervisor is used as the basis for many different commercial and open‑source applica‑
tions, such as: server virtualization, Infrastructure as a Service (IaaS), desktop virtualization, security
applications, embedded, and hardware appliances.
XenServer is based on the Xen Project hypervisor and on top of that we provide extra features and
support. XenServer uses version 4.13.4 of the Xen hypervisor.
Control domain
The Control Domain, also called Domain 0, or dom0, is a secure, privileged Linux VM that runs the
XenServer management toolstack known as XAPI. This Linux VM is based on a CentOS 7.5 distribution.
Besides providing XenServer management functions, dom0 also runs the physical device drivers for
networking, storage, and so on. The control domain can talk to the hypervisor to instruct it to start or
stop guest VMs.
Toolstack The Toolstack, or XAPI is the software stack that controls VM lifecycle operations, host
and VM networking, VM storage, and user authentication. It also allows the management of XenServer
resource pools.
XAPI provides the publicly documented management API, which is used by all tools that manage VMs,
and resource pools. For more information, see the XenServer Management API.
Guest domains are user‑created virtual machines that request resources from dom0. For a detailed
list of the supported distributions, see Supported Guests, Virtual Memory, and Disk Size Limits.
HVM is commonly used when virtualizing an operating system such as Microsoft Windows where it is
impossible to modify the kernel to make it virtualization aware.
PV on HVM PV on HVM is a mixture of paravirtualization and full hardware virtualization. The pri‑
mary goal is to boost performance of HVM guests by using specially optimized paravirtualized drivers.
This mode allows you to take advantage of the x86 virtual container technologies in newer processors
for improved performance. Network and storage access from these guests still operate in PV mode,
using drivers built in to the kernels.
Windows and Linux distributions are available in PV on HVM mode in XenServer. For a list of supported
distributions using PV on HVM, see Guest Operating System Support.
XenServer VM Tools XenServer VM Tools (formerly Citrix VM Tools or XenServer PV Tools) provide
high performance I/O services without the overhead of traditional device emulation.
• XenServer VM Tools for Windows consist of I/O drivers (also known as paravirtualized drivers or
PV drivers) and the Management Agent.
The I/O drivers contain front‑end storage and network drivers, and low‑level management inter‑
faces. These drivers replace the emulated devices and provide high‑speed transport between
VMs and XenServer product family software.
The Management Agent, also known as the guest agent, is responsible for high‑level virtual ma‑
chine management features. It provides full functionality to XenCenter (for Windows VMs).
XenServer VM Tools for Windows must be installed on each Windows VM for the VM to have a
fully supported configuration. A VM functions without the XenServer VM Tools for Windows, but
performance will be significantly hampered when the I/O drivers (PV drivers) are not installed.
• XenServer VM Tools for Linux contain a guest agent that provides extra information about the
VM to the host. Install the guest agent on each Linux VM to enable Dynamic Memory Control
(DMC).
Note:
You cannot use the Dynamic Memory Control (DMC) feature on Red Hat Enterprise Linux 8, Red
Hat Enterprise Linux 9, Rocky Linux 8, Rocky Linux 9, or CentOS Stream 9 VMs as these operating
systems do not support memory ballooning with the Xen hypervisor.
Key concepts
Resource pool
XenServer allows you to manage multiple hosts and their connected shared storage as a single entity
by using resource pools. Resource pools enable you to move and run virtual machines on different
XenServer hosts. They also allow all hosts to share a common framework for network and storage. A
pool can contain up to 64 hosts running the same version of XenServer software, at the same patch
level, and with broadly compatible hardware. For more information, see Hosts and resource pools.
XenServer resource pool adopts a primary/secondaries architecture, implemented by XAPI. XAPI calls
are forwarded from the pool coordinator (the primary) to pool members (the secondaries). Pool mem‑
bers make DB RPCs against the pool coordinator. The pool coordinator is responsible for coordination
and locking resources within the pool, and processes all control operations. Pool members talk to the
pool coordinator through HTTP and XMLRPC, but they can talk to each other (over the same channel)
through mirror disks (storage migration)
Storage repository
XenServer storage targets are called storage repositories (SRs). A storage repository stores Virtual Disk
Images (VDIs), which contains the contents of a virtual disk.
SRs are flexible, with built‑in support for SATA, SCSI, NVMe, and SAS drives that are locally connected,
and iSCSI, NFS, SAS, SMB, and Fibre Channel remotely connected. The SR and VDI abstractions allow
advanced storage features such as thin provisioning, VDI snapshots, and fast cloning to be exposed
on storage targets that support them.
Each XenServer host can use multiple SRs and different SR types simultaneously. These SRs can be
shared between hosts or dedicated to particular hosts. Shared storage is pooled between multiple
hosts within a defined resource pool. A shared SR must be network‑accessible to each host in the
pool. All hosts in a single resource pool must have at least one shared SR. Shared storage cannot be
shared between multiple pools.
For more information about how to operate with SRs, see Configure storage.
Networking
On an architecture level, there are three types of server‑side software objects to represent networking
entities. These objects are:
• A PIF, which is a software object used within dom0 and represents a physical NIC on a server.
PIF objects have a name and description, a UUID, the parameters of the NIC that they represent,
For more information about how to manage networks on XenServer, see Networking.
While Xen Hypervisor works at the core level, there are XenServer specific add‑ons related hypervisor‑
agnostic applications and services available to make the virtualization experience complete.
• XenCenter
A windows GUI client for VM management, implemented based on the management API. Xen‑
Center provides a rich user experience to manage multiple XenServer hosts,
resource pools, and the entire virtual infrastructure associated with them.
An appliance that balances your pool by relocating virtual machines onto the best possible
hosts for their workload in a resource pool. For more information, see Workload balancing (/en‑
us/xenserver/8/wlb.html).
A Linux based appliance that XenCenter contacts to request a license for the specified server.
A virtual appliance that enables users to convert existing VMware virtual machines into
XenServer virtual machines, with comparable networking and storage connectivity. For more
information, see Conversion manager.
• Citrix Provisioning
Provisioning Services that support PXE boot from common images. Used widely with Citrix Vir‑
tual Desktops and Citrix Virtual Apps. For more information, see Provisioning.
A Virtual Desktop Infrastructure (VDI) product specialized to Windows desktops. Citrix Virtual
Desktops uses XAPI to manage XenServer in a multi‑host pool configuration. For more informa‑
tion, see Citrix Virtual Apps and Desktops.
Technical FAQs
August 6, 2024
Hardware
For the minimum system requirements for this release, see System requirements.
Yes. Either an Intel VT or AMD‑V 64‑bit x86‑based system with one or more CPUs is required to run all
supported guest operating systems.
For more information about host system requirements, see System requirements.
You need a 64‑bit x86 processor‑based system that supports either Intel VT or AMD‑V hardware virtu‑
alization technology in the processor and system firmware.
For a complete list of XenServer certified systems, see the Hardware Compatibility List (HCL).
Does XenServer support AMD Rapid Virtualization Indexing and Intel Extended Page Tables?
Yes. XenServer supports AMD Rapid Virtualization Indexing and Intel Extended Page Tables. Rapid
Virtualization Indexing provides an implementation of nested tables technology used to further en‑
hance the performance of the Xen hypervisor. Extended Page Tables provide an implementation of
hardware‑assisted paging used to further enhance the performance of the Xen hypervisor.
XenServer runs on many notebook or desktop‑class systems that conform to the minimum CPU re‑
quirements. However, XenServer only supports systems that have been certified and listed on the
Hardware Compatibility List (HCL).
You can choose to run on unsupported systems for demonstration and testing purposes. However,
some features, such as power management capabilities, do not work.
No. XenServer does not support using SD cards or USB cards for your XenServer installation.
We only support hardware that has been certified and listed on the Hardware Compatibility List
(HCL).
Product limits
Resource sharing
XenServer splits processing resources between vCPUs using a fair‑share balancing algorithm. This
algorithm ensures that all VMs get their share of the processing resources of the system.
How does XenServer choose which physical processors it allocates to the VM?
XenServer doesn’t statically allocate physical processors to any specific VM. Instead, XenServer dy‑
namically allocates, depending on load, any available logical processors to the VM. This dynamic al‑
location ensures that processor cycles are used efficiently because the VM can run wherever there is
spare capacity.
XenServer uses a fair‑share resource split for disk I/O resources between VMs. You can also provide a
VM higher or lower priority access to disk I/O resources.
XenServer uses a fair‑share resource split for network I/O resources between the VMs. You can also
control the rate of outgoing data by using the Open vSwitch. For more information, see Control the
rate of outgoing data (QoS).
For a list of supported Windows guest operating systems, see Supported guest operating systems.
For a list of supported Linux guest operating systems, see Supported guest operating systems.
Can I run different versions of the supported operating systems or other unlisted operating
systems?
We only support operating systems (OS) under OS vendor support. Although unsupported operating
systems might continue to function, we might ask you to upgrade to a supported OS service pack
before we can investigate any issues.
Applicable drivers might not be available for OS versions that are unsupported. Without the drivers,
these OS versions do not function with optimized performance.
It’s often possible to install other distributions of Linux. However, XenServer can only support the
operating systems listed in Supported guest operating systems. We might ask you to switch to a sup‑
ported OS before issues we can investigate any issues.
Does XenServer support FreeBSD, NetBSD, or any other BSD variants as a guest operating
system?
XenServer doesn’t support any BSD‑based guest operating systems for general‑purpose virtualization
deployments. However, FreeBSD VMs running on XenServer have been certified for use in specific
NetScaler products.
The XenServer VM Tools are software packages for Windows and Linux guest operating systems. For
Windows operating systems, the XenServer VM Tools for Windows include high‑performance I/O dri‑
vers (PV drivers) and the Management Agent.
For Linux operating systems, the XenServer VM Tools for Linux include a Guest Agent that provides
additional information about the VM to the XenServer host.
Docker
No. You cannot run Docker containers on a Windows VM that is hosted on XenServer. This restriction
is because XenServer does not support nested virtualization for Windows VMs.
No.
In previous releases of XenServer and Citrix Hypervisor, a Container Management supplemental pack
was available that enabled you to manage your Docker containers through XenCenter. This feature
has been removed.
XenCenter
Yes. The XenCenter management console runs on a Windows operating system. For information about
the system requirements, see System requirements
If you don’t want to run Windows, you can manage your XenServer hosts and pools by using the xe
CLI or by using xsconsole, a system configuration console.
Yes. You can set up XenCenter login requests to use Active Directory on all editions of XenServer.
Yes. The Role Based Access Control feature combined with Active Directory authentication can restrict
access for users in XenCenter.
Yes. You can use a single XenCenter console to connect to multiple XenServer host systems.
Can I use XenCenter to connect to multiple hosts running different versions of XenServer?
Depending on the version of XenServer ‑ yes. XenCenter is backwards‑compatible with Citrix Hyper‑
visor 8.0 and later versions. However, note that only Citrix Hypervisor 8.2 CU 1 is receiving full sup‑
port.
Yes. You can connect to multiple resource pools from a single XenCenter console.
The Console tab in XenCenter provides access to the text‑based and graphical consoles of VMs running
Linux operating systems. Before you can connect with the graphical console of a Linux VM, install and
configure a VNC server and an X display manager on the VM.
XenCenter also enables you to connect to Linux VMs over SSH by using the Open SSH Console option
on the Console tab of the VM.
XenCenter provides access to the emulated graphics for a Windows VM. If XenCenter detects remote
desktop capabilities on the VM, XenCenter provides a quick connect button to launch a built‑in RDP
client that connects to the VM. Or, you can connect directly to your guests by using external remote
desktop software.
Yes. All editions of XenServer include a full command line interface (CLI) –known as xe.
Yes. You can access the CLI by connecting a screen and keyboard directly to the host, or through a
terminal emulator connected to the serial port of the host.
Yes. XenServer ships the xe CLI, which can be installed on Windows and 64‑bit Linux machines to
control XenServer remotely. You can also use XenCenter to access the console of the host from the
Console tab.
Yes. You can log in using Active Directory on all editions of XenServer.
Can I restrict access the use of certain CLI commands to certain users?
VMs
Yes. You can export and import VMs using the industry‑standard OVF format.
You can also convert VMs in batches using the XenServer Conversion Manager. Third‑party tools are
also available.
What types of installation media can I use to install a guest operating system?
Yes. Any VM created on XenServer can be cloned or converted into a VM template. A VM template can
then be used to create more VMs.
Can VMs be exported from one version of XenServer and moved to another?
Yes. VMs exported from older versions of XenServer can be imported to a newer version.
No.
Yes. XenServer supports using snapshots in all editions. For more information, see VM Snapshots.
Storage
XenServer supports Fibre Channel, FCoE, Hardware‑based iSCSI (HBA), iSCSI, NFS, and SMB storage
repositories.
For more information, see Storage and the Hardware Compatibility List.
XenServer requires NFSv3 or NFSv4 over TCP for remote storage use. XenServer currently does not
support NFS over User Datagram Protocol (UDP).
Can I use software‑based NFS running on a general‑purpose server for remote shared storage?
Yes. Although we recommend using a dedicated NAS device with NFSv3 or NFSv4 with high‑speed
non‑volatile caching to achieve acceptable levels of I/O performance.
Can I boot a XenServer host system from an iSCSI, Fibre Channel or FCoE SAN?
Yes. XenServer supports Boot from SAN using Fibre Channel, FCoE, or iSCSI HBAs.
Yes. XenServer supports booting from UEFI. However, UEFI Secure Boot is not supported for XenServer
hosts.
Booting from BIOS is currently supported, but is deprecated and will be removed in a future release.
For more information, see Network boot installations
No. XenServer doesn’t support proprietary RAID‑like solutions, such as HostRAID or FakeRAID.
Yes. Thin cloning is available on local disks formatted as EXT3/EXT4, in addition to NFS and SMB stor‑
age repositories.
Networking
Yes. You can create a private network on a single host for resident VMs.
Yes. You can connect to or associate multiple physical networks that attach to different network inter‑
faces on the physical host system.
VMs hosted on XenServer can use any combination of IPv4 and IPv6 configured addresses.
However, XenServer doesn’t support the use of IPv6 in its Control Domain (dom0). You can’t use IPv6
for the host management network or the storage network. IPv4 must be available for the XenServer
host to use.
By default, XenServer network interfaces are non‑promiscuous and a VM can only see traffic for that
VM and broadcast traffic.
This behavior can be configured depending on the network stack that you are using.
• If you are using the Linux bridge as the network stack, your virtual network interfaces can be
configured for promiscuous mode. This mode enables you to see all traffic on a virtual switch.
For more information about promiscuous mode configuration, see the following Knowledge
Center articles:
When you enable promiscuous mode on a virtual network interface, for a VM to make use of this
configuration, you must also enable promiscuous mode within your VM.
• If you are using the Open vSwitch (OVS) as your network stack, it acts as a Layer 2 switch. A VM
only sees traffic for that VM. Also, the switch‑port locking in XenServer enables increased levels
of isolation and security. OVS cannot be configured in promiscuous mode.
Yes. XenServer supports physical network interface bonding for failover and link aggregation with
optional LACP support. For more information, see Networking.
Memory
The amount of memory required to run dom0 is adjusted automatically. By default, XenServer allo‑
cates 1 GiB plus 5% of the total physical memory to the control domain, up to an initial maximum of
8 GiB.
Note:
The amount of memory allocated to the Control Domain can be increased beyond the default
amount.
In XenCenter, the Xen field in the Memory tab reports the memory used by the Control Domain, by
the Xen hypervisor itself, and by the XenServer Crash Kernel. The amount of memory used by the
hypervisor is larger for hosts with more memory.
Yes. XenServer uses Dynamic Memory Control (DMC) to automatically adjust the memory of running
VMs. These adjustments keep the amount of memory allocated to each VM between specified mini‑
mum and maximum memory values, guaranteeing performance and permitting greater VM density.
Resource pools
A resource pool is a set of XenServer hosts managed as a unit. Typically, a resource pool shares some
amount of networked storage to allow VMs to be rapidly migrated from one host to another within the
pool.
No. A single host in the pool must be specified as the pool coordinator. The pool coordinator controls
all administrative activities required on the pool. This design means that there is no external single
point of failure. If the pool coordinator fails, other hosts in the pool continue to operate, and the
resident VMs continue to run as normal. If the pool coordinator cannot come back online, XenServer
promotes one of the other hosts in the pool to coordinator to regain control of the pool.
This process is automated with the High Availability feature. For more information, see High availabil‑
ity.
A copy of the configuration data is stored on every host in the resource pool. If the current pool coor‑
dinator fails, this data enables any host in the resource pool to become the new pool coordinator.
Shared remote storage and networking configurations can be made at the resource pool level. When
a configuration is shared on the resource pool, the coordinator system automatically propagates con‑
figuration changes to all the member systems.
Are new host systems added to a resource pool automatically configured with shared settings?
Yes. Any new host systems added to a resource pool automatically receive the same configurations
for shared storage and network settings.
Can I use different types of CPUs in the same XenServer resource pool?
Yes. We recommend that the same CPU type is used throughout the pool (homogeneous resource
pool). However, it is possible for hosts with different CPU types to join a pool (heterogeneous), pro‑
vided the CPUs are from the same vendor.
For updated information about the support for feature masking for specific CPU types, see Hardware
Compatibility List.
With live migration you can move running VMs when hosts share storage (in a pool).
Also, storage live migration allows migration between hosts that do not share storage. VMs can be
migrated within or across pools.
High availability
Yes. If high availability is enabled, XenServer continually monitors the health of the hosts in a pool.
If high availability detects that a host is impaired, the host is automatically shut down. This action
allows for VMs to be restarted safely on an alternative healthy host.
No. If you want to use high availability, shared storage is required. This shared storage enables VMs
to be relocated if a host fails. However, high availability allows VMs that are stored on local storage to
be marked for automatic restart when the host recovers after a reboot.
Can I use high availability to automatically sequence the restart of recovered VMs?
Yes. High availability configuration allows you to define the order that VMs are started. This capability
enables VMs that depend on one another to be sequenced automatically.
Performance metrics
Yes. XenServer provides detailed monitoring of performance metrics. These metrics include CPU,
memory, disk, network, C‑state/P‑state information, and storage. Where appropriate, these metrics
are available on a per‑host and a per‑VM basis. Performance metrics are available directly (exposed as
Round Robin Databases), or can be accessed and viewed graphically in XenCenter or other third‑party
applications. For more information, see Monitor and manage your deployment.
Data for the XenServer performance metrics are collected from various sources. These sources include
the Xen hypervisor, Dom0, standard Linux interfaces, and standard Windows interfaces such as WMI.
Yes. XenCenter displays real‑time performance metrics on the Performance tab for each running VM
and for the XenServer host. You can customize the metrics that are displayed.
Yes. XenServer keeps performance metrics from the last year (with decreasing granularity). XenCenter
provides a visualization of these metrics in real‑time graphical displays.
Installation
Does XenServer install on top of systems that are already running an existing operating
system?
No. XenServer installs directly on bare‑metal hardware, avoiding the complexity, overhead, and per‑
formance bottlenecks of an underlying operating system.
Yes. If you are running a supported version of XenServer you can upgrade to a newer version of
XenServer instead of doing a fresh installation. For more information, see Upgrade.
Can I upgrade from an out‑of‑support version of Citrix Hypervisor or XenServer to this version?
If your existing version of Citrix Hypervisor or XenServer is no longer in support, you cannot upgrade
or update to the latest version of XenServer. Only upgrades from Citrix Hypervisor 8.2 Cumulative
Update 1 are supported.
How much local storage does XenServer require for installation on the physical host system?
Yes. You can install XenServer on the host system by using PXE. You can also automatically install
XenServer using PXE by creating a pre‑configured answer file.
No. Xen is a Type 1 hypervisor that runs directly on the host hardware (“bare metal”). After the hyper‑
visor loads, it starts the privileged management domain –the control domain (dom0), which contains
a minimal Linux environment.
XenServer uses the device drivers available from the Linux kernel. As a result, XenServer runs on a
wide variety of hardware and storage devices. However, we recommend that you use certified device
drivers.
For more information, see the Hardware Compatibility List.
Licensing
Technical Support
Do I have to purchase a XenServer technical support contract at the same time as I get a
XenServer license?
No. A technical support contract is included with your license. For information about the level of sup‑
port we provide for Premium and Standard Edition customers, visit the XenServer support pages.
When you get a XenServer per‑socket license, you also get the benefit of our Technical Support ser‑
vices. For more information about levels of support, see https://xenserver.com/support.
If you are a Trial Edition user, you are not eligible for support. However, we value your feedback: Pro‑
vide feedback.
Yes. There are several alternative channels for getting technical support for XenServer. You can also
use Citrix Knowledge Center or contract with authorized XenServer partners who offer technical sup‑
port services.
Does XenServer provide technical support for the open‑source Xen project?
No. XenServer doesn’t provide technical support for the open‑source Xen project. For more informa‑
tion, visit http://www.xen.org/.
What happens if an open‑source component included within a XenServer release reaches EOL?
We support XenServer in accordance with the dates specified in the XenServer Product Matrix
(https://www.xenserver.com/support). This includes open‑source and 3rd‑party components to such
extent as they are included and used in our product.
We work hard to keep our product secure and endeavour to remediate any exploitable issues. We
welcome reports of potential vulnerabilities from customers and security researchers.
Although we prioritize investigating and addressing issues that have a reasonable basis for exploitabil‑
ity over unsubstantiated reports, many security scanners do not attempt to determine if an issue is
actually exploitable before reporting it as a vulnerability. If you are concerned about an issue reported
by a security scanner, we appreciate any supporting evidence of potential exploitability.
Customers who have questions about reports from security scanners should contact their usual sup‑
port channels. If you have grounds to believe that an issue is exploitable, you can report this to se‑
[email protected]. See Vulnerability Response for details.
Can I open a technical support incident with XenServer if I’m experiencing a non‑technical
issue?
No. Raise any non‑technical issues through Citrix Customer Service. For example, issues to do with
software maintenance, licensing, administrative support, and order confirmation.
Licensing overview
August 6, 2024
Important:
If you are using XenServer to run your Citrix Virtual Apps and Desktops workloads, you must
have a Premium Edition license. For more information about getting a XenServer license, see
the XenServer website.
This requirement is a change of behavior since the previous version of Citrix Hypervisor/X‑
enServer. For more information, see the licensing FAQ.
XenServer is now an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid Multi‑
Cloud, Citrix Universal MSP, and Citrix Platform License subscriptions for running your Citrix
workloads. Read more.
• Premium Edition is our premium offering, optimized for desktop, server, and cloud workloads.
In addition to the features available in the Standard Edition, the Premium Edition offers the
following features:
• Standard Edition is our entry‑level commercial offering. It has a range of features for customers
who want a robust and high‑performing virtualization platform, but don’t require the premium
features of Premium Edition. Meanwhile, they still want to benefit from the assurance of com‑
prehensive support and maintenance. This option is no longer available for renewal or to new
customers. Existing Standard Edition licenses are supported until their expiry.
• Trial Edition currently showcases our Premium Edition feature set on a restricted size pool
(maximum three hosts), but doesn’t allow rolling pool upgrade through XenCenter.
XenServer is licensed on a per‑socket basis. Allocation of licenses is managed centrally and enforced
by a standalone Citrix License Server (physical or virtual) in the environment. For more information
about XenServer licensing, see the Licensing FAQ.
XenServer uses the same licensing process as some Citrix products. To use XenServer Premium Edi‑
tion or XenServer Standard Edition, you require a valid license to be installed on a Citrix License Server
and assigned to your XenServer host. This process is covered in detail in the Licensing guide for
XenServer.
Note:
XenServer does not currently support licensing hosted on Citrix Cloud. An on‑premises Citrix
License Server is required.
• A license
You can download the Citrix License Server for Windows from the Citrix Licensing downloads page.
Install the Citrix License Server on a Windows system according to the instructions in the Citrix Licens‑
ing documentation.
The Windows system that you install your Citrix License Server on can be a Windows VM hosted in your
XenServer pool.
XenServer operates with a ‘grace’license until the License Server can boot. This behavior means, after
you have licensed the XenServer hosts in your pool, if you reboot the host that has the Citrix License
Server running on it, a grace period is applied until the License Server is restarted.
Download a license file that is tied to the case‑sensitive host name of your Citrix License Server and
contains a large enough number of per‑socket licenses to share across the hosts you want to license.
For more information about getting a XenServer license, see the XenServer website.
For more information about getting your license files, see the Citrix Licensing product documenta‑
tion.
Use the Citrix Licensing Manager to install the licenses on your Citrix License Server. For more infor‑
mation, see the Citrix Licensing product documentation.
You can allocate licenses hosted on a Citrix License Server to your XenServer hosts and pools by using
XenCenter or the xe CLI.
Apply a license to all the hosts using XenCenter A: Follow this procedure to apply a license:
2. Select the pool or hosts that you want to license, and then click Assign License.
3. In the Apply License dialog, specify the Edition type to assign to the host.
5. Click OK.
Apply a license to hosts or pools by using the xe CLI To apply a license to a single host, run the
host-apply-edition command:
1 xe host-apply-edition edition=premium-per-socket|standard-per-
socket \
2
3 license-server-address=<license_server_address> host-uuid=<
uuid_of_host> \
4
5 license-server-port=<license_server_port>
1 xe pool-apply-edition edition=premium-per-socket|standard-per-
socket \
2
3 license-server-address=<license_server_address> pool-uuid=<
uuid_of_pool> \
4
5 license-server-port=<license_server_port>
Licensing FAQ
August 6, 2024
This article contains frequently asked questions about licensing your XenServer hosts and pools.
• General questions
• Citrix Virtual Apps and Desktops
• Citrix License Servers
• Licensing a XenServer pool
• More information
General questions
A: You can learn about getting a XenServer license at the XenServer website.
A: XenServer requires a License Server. After licensing XenServer, you are provided with a .LIC license
access code. Install this license access code on your Citrix License Server.
When you assign a license to a XenServer host, XenServer contacts the specified Citrix License Server
and requests a license for the specified hosts. If successful, a license is checked out and the License
Manager displays information about the license the hosts are licensed under.
A: XenServer is licensed on a per‑CPU socket basis. For a pool to be considered licensed, all XenServer
hosts in the pool must be licensed. XenServer only counts populated CPU sockets.
You can use the Citrix License Server to view the number of available licenses displayed in the License
Administration Console Dashboard.
A: No, only populated CPU sockets are counted toward the number of sockets to be licensed.
Q: What happens if I have a licensed pool and the License Server becomes unavailable?
A. If your license has not expired and the License Server is unavailable, you receive a grace period of
30 days at the licensing level that was applied previously.
After the grace period, if your license is still unavailable, your pool changes to a Trial Edition pool and
only those features included in Trial Edition are available. Your pool remains the same size, but if it
has three or more hosts, you cannot add any more hosts to it.
A: With Trial Edition, you can install XenServer without a license and trial all the Premium Edition
features in a reduced‑size pool. For more information, see XenServer editions.
A: Yes. XenServer 8 Trial Edition makes XenServer available without a license. The edition provides
all of the Premium Edition features in a reduced‑size pool of up to three hosts. For more information,
see XenServer editions.
No, XenServer does not currently support licensing hosted on Citrix Cloud. To license XenServer, you
require a License Server. For more information, see Licensing your hosts and pools.
When you get a XenServer per‑socket license, you also get the benefit of our Technical Support ser‑
vices. For more information about levels of support, see https://xenserver.com/support.
If you are a Trial Edition user, you are not eligible for support. However, we value your feedback: Pro‑
vide feedback.
A: No. You can upgrade your hosts to XenServer 8 using the previously bought per‑socket licenses,
provided Customer Success Services is valid at least until Mar 1, 2024.
If you have renewed your Customer Success Services after the original purchase, you might need to
refresh the license file on the License Server to ensure it displays the Customer Success Services eligi‑
bility.
A: Yes. Before attempting to upgrade to XenServer 8, you must obtain XenServer Premium Edition
licenses, import them into Citrix License Server, and assign them to the XenServer hosts that are cur‑
rently using Citrix Virtual Apps and Desktops licenses.
For more information, see Citrix Virtual Apps and Desktops questions.
• If you are using a Premium or Standard Edition license or are using XenServer 8 preview without
a license (Trial Edition), your XenServer hosts require no licensing changes.
• If you are using a Citrix Virtual Apps and Desktops license, your XenServer hosts show this license
as deprecated. You must get a XenServer Premium Edition license to continue to run your Citrix
Virtual Apps and Desktops workloads on XenServer.
For more information, see Citrix Virtual Apps and Desktops questions.
Q: What edition of XenServer do I need to run Citrix Virtual Apps and Desktops workloads on
XenServer?
A: To run your Citrix Virtual Apps and Desktops workloads on XenServer, you must have a Premium
Edition per‑socket license for XenServer. Premium Edition delivers many advanced features that
make XenServer a highly optimized hypervisor platform for your workload. For more information,
see XenServer editions.
For more information about getting a XenServer license, see the XenServer website.
XenServer is now an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid Multi‑Cloud,
Citrix Universal MSP, and Citrix Platform License subscriptions for running your Citrix workloads. Read
more.
Q: I am a Citrix Virtual Apps and Desktops or Citrix DaaS customer moving from an earlier
version of Citrix Hypervisor to XenServer 8. Do I have to do anything?
A: Yes. Before attempting to upgrade to XenServer 8, you must obtain XenServer Premium Edition
licenses, import them into Citrix License Server, and assign them to the XenServer hosts that are cur‑
rently using Citrix Virtual Apps and Desktops licenses.
For more information about getting a XenServer license, see the XenServer website. XenServer is now
an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid Multi‑Cloud, Citrix Universal MSP,
and Citrix Platform License subscriptions for running your Citrix workloads. Read more.
This behavior is different to that of earlier versions of Citrix Hypervisor and XenServer. Citrix Hypervi‑
sor 8.2 Cumulative Update 1 and earlier used Citrix Virtual Apps and Desktops licenses for XenServer.
Now separate XenServer licenses are provided as part of your entitlement.
Q: I am a Citrix Service Provider licensed for Citrix Virtual Apps and Desktops or Citrix DaaS.
Can I use this license for XenServer when I upgrade to XenServer 8?
A: No. Before attempting to upgrade to XenServer 8, you must obtain XenServer Premium Edition
licenses, import them into Citrix License Server, and assign them to the XenServer hosts that are cur‑
rently using Citrix Virtual Apps and Desktops licenses.
For more information about getting a XenServer license, see the XenServer website. XenServer is now
an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid Multi‑Cloud, Citrix Universal MSP,
and Citrix Platform License subscriptions for running your Citrix workloads. Read more.
This behavior is different to that of earlier versions of Citrix Hypervisor and XenServer. Citrix Hypervi‑
sor 8.2 Cumulative Update 1 and earlier used Citrix Virtual Apps and Desktops licenses for XenServer.
Now separate XenServer licenses are provided as part of your entitlement.
A: No. You must obtain XenServer Premium Edition licenses, import them into Citrix License Server,
and assign them to your XenServer hosts.
For more information about getting a XenServer license, see the XenServer website. XenServer is now
an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid Multi‑Cloud, Citrix Universal MSP,
and Citrix Platform License subscriptions for running your Citrix workloads. Read more.
This behavior is different to that of earlier versions of Citrix Hypervisor and XenServer. Citrix Hypervi‑
sor 8.2 Cumulative Update 1 and earlier used Citrix Virtual Apps and Desktops licenses for XenServer.
Now separate XenServer licenses are provided as part of your entitlement.
Q: What are the constraints on the use of the XenServer advanced virtualization management
capabilities delivered as part of Citrix Virtual Apps and Desktops?
A: To run Citrix Virtual Apps and Desktops workloads on XenServer, you need a Premium Edition li‑
cense. Premium Edition delivers many advanced features that make XenServer a highly optimized
hypervisor platform for your workload.
For information about the advanced capabilities that XenServer provides for Citrix Virtual Apps and
Desktops, see Using XenServer with Citrix products.
For more information about getting a XenServer license, see the XenServer website. XenServer is now
an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid Multi‑Cloud, Citrix Universal MSP,
and Citrix Platform License subscriptions for running your Citrix workloads. Read more.
A: You can use the Citrix License Server software version 11.16 or later on a server running Microsoft
Windows.
In previous releases, we supported a Linux‑based License Server virtual appliance. This product is no
longer supported. If you are using the License Server virtual appliance with an existing pool, migrate
to the latest version of Citrix License Server for Windows before upgrading to XenServer 8.
A: For information on importing a license file, see the Citrix Licensing documentation.
A: Yes. You can install the Citrix License Server software on a Windows VM.
XenServer operates with a ‘grace’license until the License Server is able to boot. This behavior means,
after you have licensed the XenServer hosts in your pool, and you reboot the host that has the Citrix Li‑
cense Server running on it, a grace period is applied to that host until the License Server is restarted.
Q: Can I use the Windows version of the Citrix License Server with XenServer?
A: Yes.
Q: Can I install Licenses for Citrix products on the Citrix License Server software installed on
Windows?
A: Yes, you can license Citrix products by using the Citrix License Server software installed on Windows.
For more information, see Licensing on the Citrix Product Documentation website.
2. Select the Pool or Hosts you would like to license, and then click Assign License.
3. In the Apply License dialog, specify the Edition type to assign to the host, and type the host
name or IP address of the License Server.
A: Yes, you can use the xe CLI. Run the host-apply-edition command. For example, enter the
following to license a host:
1 xe host-apply-edition edition=enterprise-per-socket|standard-per-
socket \
2
3 license-server-address=<license_server_address> host-uuid=<
uuid_of_host> \
4
5 license-server-port=<license_server_port>
To license a pool, use the pool-apply-edition command. For example, enter the following to
license a pool:
1 xe pool-apply-edition edition=enterprise-per-socket|standard-per-
socket \
2
3 license-server-address=<license_server_address> host-uuid=<
uuid_of_host> \
4
5 license-server-port=<license_server_port>
More information
• For more information about the XenServer 8 release, see XenServer 8 Release Notes.
Install
September 5, 2024
XenServer installs directly on bare‑metal hardware avoiding the complexity, overhead, and perfor‑
mance bottlenecks of an underlying operating system.
XenServer uses the device drivers available from the Linux kernel. As a result, XenServer can run on a
wide variety of hardware and storage devices. However, ensure that you use certified device drivers.
For more information, see the Hardware Compatibility List (HCL).
Important:
The XenServer host must be installed on a dedicated 64‑bit x86 server. Do not install any other
operating system in a dual‑boot configuration with the XenServer host. This configuration is not
supported.
This section is primarily aimed at system administrators who want to set up XenServer hosts on phys‑
ical servers. It contains procedures to guide you through the installation or upgrade process. It also
contains information about troubleshooting problems that might occur during installation and points
you to extra resources.
Depending on your environment, the installation method to use to get your hosts and pools to the
latest version of XenServer 8 differs.
• If you already have Citrix Hypervisor 8.2 Cumulative Update 1 installed on your hosts and pools,
Upgrade from Citrix Hypervisor 8.2 Cumulative Update 1.
• If you already installed XenServer 8 (including during its preview period), you cannot upgrade
or update from the installation ISOs. Instead, apply the latest level of frequent updates through
XenCenter. For more information, see Update XenServer 8.
• If you are already running any other version of XenServer or Citrix Hypervisor on your hosts and
pools, upgrading from these versions is not supported. Do a fresh installation of XenServer 8.
• If you are installing XenServer for the first time on your hosts and pools, do a fresh installation
of XenServer 8.
Installation methods
• Use the XenServer 8 Installation ISO file. You can download this file from the XenServer down‑
load page.
• Review the information in System Requirements, Licensing XenServer, and Installing XenServer
and XenCenter before installing XenServer.
Upgrade If you are upgrading from Citrix Hypervisor 8.2 Cumulative Update 1 to XenServer 8:
• Use the XenServer 8 Installation ISO file. You can download this file from the XenServer down‑
load page.
• Review the information in System Requirements, Licensing XenServer, and Upgrading from an
existing version before upgrading XenServer.
The installer presents the option to upgrade when it detects a previously installed version of XenServer.
The upgrade process follows the first‑time installation process, but several setup steps are bypassed.
The existing settings are retained, including networking configuration, system time and so on.
You cannot upgrade directly from out‑of‑support versions of XenServer or Citrix Hypervisor to
XenServer 8. Instead, perform a fresh installation.
Update Existing installations of XenServer 8 receive the latest updates through the frequent update
mechanism. For more information, see Update XenServer 8.
XenServer supports booting hosts using either UEFI or BIOS boot mode. UEFI Secure Boot is not cur‑
rently available for XenServer hosts.
Note:
Booting XenServer hosts in BIOS mode is now deprecated. You can still install your XenServer 8
hosts in BIOS boot mode. However, doing so can prevent you from upgrading your XenServer 8
hosts to a future version of XenServer. We recommend that you install your XenServer 8 hosts by
using UEFI boot mode.
The server boot mode changes how you initiate the installation process. After the installer starts, the
installation process is the same for both boot modes.
This procedure takes you through doing a manual installation from local media. For information
about other types of installation ‑ such as network installation, unattended installation, or boot from
SAN, see Other installation scenarios.
Tip:
Throughout the installation, quickly advance to the next screen by pressing F12. Use the Tab key
to move between elements and Space or Enter to select. Press F1 for general help.
1. Back up any data you want to preserve. Installing XenServer overwrites data on any hard drives
that you select to use for the installation.
a) Create a bootable USB from the XenServer installation ISO. Ensure that the tool does
not alter the contents of the ISO file.
– On Linux, you can use the dd command to write the ISO to a USB. For example,
dd if=<path_to_source_iso> of=<path_to_destination_usb>.
– On Windows, you can use Rufus. Ensure that you select Write in DD Image mode.
If this is not selected, Rufus can alter the contents of the ISO file and cause it not
to boot.
(If necessary, see your hardware vendor documentation for information on changing
the boot order)
b) Insert the bootable CD/DVD into the CD/DVD drive on the target system.
(If necessary, see your hardware vendor documentation for information on changing
the boot order)
e) Change the settings to boot the system from the virtual media.
(If necessary, see your hardware vendor documentation for information on changing
the boot order)
3. Following the initial boot messages and the Welcome to XenServer screen, select your key map
(keyboard layout) for the installation.
Note:
If a System Hardware warning screen is displayed and hardware virtualization assist sup‑
port is available on your system, see your hardware manufacturer for BIOS upgrades.
4. At the Welcome to XenServer Setup screen, XenServer offers the following options:
XenServer ships with a broad driver set that supports most modern server hardware con‑
figurations. However, you might need to apply driver disks (a type of supplemental pack)
in order to be able to perform the XenServer installation. If you have been provided with
any additional essential device drivers, press F9. The installer steps you through loading
the necessary drivers.
Warning:
You cannot install other types of supplemental packs at this point in the installation
process. You can install them along with additional driver disks near the end of the
installation process.
If you have done the necessary configuration in your network infrastructure, you can con‑
figure the XenServer installation to boot from software FCoE (deprecated). Press F10 and
follow the instructions displayed on the screen to set up software FCoE. For more informa‑
tion, see Other installation scenarios.
After you have completed any steps you require on this page, select OK to proceed.
5. Scroll through and read the XenServer End User Agreement (EUA). Select Accept EUA to pro‑
ceed.
If you choose not to accept the EUA, you cannot continue with the installation.
6. Select the appropriate action from the list. This list always includes:
• Perform clean installation: Choose this option to continue with a fresh installation.
Depending on the state of your server, you might also see the following options:
• Upgrade: If the installer detects a previously installed version of XenServer or Citrix Hy‑
pervisor, it offers the option to upgrade. For information about upgrading your XenServer
host, see Upgrading from an existing version.
• Restore: If the installer detects a previously created backup installation, it offers the op‑
tion to restore XenServer from a backup.
7. If you have multiple local hard disks, choose a primary disk for the installation. Select OK.
8. Choose which disks that you want to use for virtual machine storage. View information about a
specific disk by pressing F5. Select OK.
9. If you selected disks that all have 512 byte blocks, you have the option to use thin provisioning
to optimize the use of available storage. Select Enable thin provisioning to allow the local SR
of the host to be used for local caching of VM VDIs. Citrix Virtual Desktops and DaaS users are
recommended to select this option for local caching to work properly. For more information,
see Storage.
Note:
If you selected disks that are 4KB native, the virtual machine storage is automatically con‑
figured for a large disk block size.
Select OK to proceed.
Select OK to proceed.
11. If you select HTTP or FTP or NFS in the previous step, set up networking so that the installer can
connect to the XenServer installation media files:
a) If the computer has multiple NICs, select one of them to be used to access the XenServer
installation media files. Choose OK to proceed.
b) Choose Automatic configuration (DHCP) to configure the NIC using DHCP, or Static con‑
figuration to configure the NIC manually. If you choose Static configuration, enter details
as appropriate.
c) Provide VLAN ID if you have your installation media present in a VLAN network.
d) If you choose HTTP or FTP, provide the URL for your HTTP or FTP repository, and a user
name and password, if appropriate.
If you choose NFS, provide the server and path of your NFS share.
e) Choose OK to proceed.
For more information about setting up your installation media on NFS, FTP, or HTTP, see Other
installation scenarios.
12. Indicate if you want to verify the integrity of the installation media. If you select Verify instal‑
lation source, the SHA256 checksum of the packages is calculated and checked against the
known value. Verification can take some time. Make your selection and choose OK to proceed.
13. Set and confirm a root password, which XenCenter uses to connect to the XenServer host. You
also use this password (with user name “root”) to log into xsconsole, the system configuration
console.
Note:
14. Set up the primary management interface that XenCenter uses to connect to and manage the
host.
If your computer has multiple NICs, select the NIC that you want to use for management. Choose
OK to proceed.
Note:
To be part of a pool, XenServer hosts must have static IP addresses or be DNS addressable.
When using DHCP, ensure that a static DHCP reservation policy is in place.
• Choose Automatically set via DHCP to have the DHCP server provide the host name
along with the IP address.
• Choose Manually specify to define the host name yourself. Enter the host name for
the server in the field provided.
Note:
If you manually specify the host name, enter a short host name and not the fully qualified
domain name (FQDN). Entering an FQDN can cause external authentication to fail, or the
XenServer host might be added to Active Directory with a different name.
• Choose Automatically set via DHCP to get name service configuration using DHCP.
• Select Manually specify to define the DNS servers yourself. Enter the IP addresses of
your primary (required), secondary (optional), and tertiary (optional) DNS servers in
the fields provided.
Select OK to proceed.
17. Select your time zone by geographical area and city. You can type the first letter of the desired
locale to jump to the first entry that begins with this letter. Choose OK to proceed.
18. Specify how you want the XenServer host to determine local time. XenServer offers the follow‑
ing options:
• Using NTP: Select this option to use the NTP protocol to set your server time. On the next
screen, configure it in one of the following ways:
– Select NTP is configured by my DHCP server to have your network provide the NTP
server host name or IP address.
– Manually enter at least one NTP server name or IP address.
Choose OK to proceed.
• Manual time entry: Select this option to set the date and time manually.
On the next screen, enter the current time in UTC.
Choose OK to proceed.
Note:
XenServer assumes that the time setting on the server is the current time in UTC.
Choose OK to proceed.
The installation process starts. This process might take some minutes.
20. The next screen asks if you want to install any supplemental packs (including driver disks).
Note:
If you have already loaded a driver disk during initial installation, you might be prompted
to reinsert the driver disk so that the driver can be installed onto disk. At this point, reinsert
the driver disk to ensure that your XenServer instance contains the new driver.
• If you want to install any supplemental packs or driver disks provided by your hardware
supplier, choose Yes.
Important:
If you want to install th NVIDIA Virtual GPU Manager supplemental pack, we strongly
recommend that you do not install this pack now. Instead, install it into your
XenServer host by using xe CLI or XenCneter. For more information, see Install the
NVIDIA vGPU Manager for XenServer.
a) You are prompted to insert the supplemental pack. Eject the XenServer installation
media, and insert the supplemental pack media.
b) Choose OK.
The installation process completes. This process can take a few minutes.
21. When prompted by the Installation Complete screen, eject the installation media (if installing
from USB or CD).
After the host reboots, XenServer displays xsconsole, a system configuration console. To access a
local shell from xsconsole, press Alt+F3; to return to xsconsole, press Alt+F1.
Note:
Make note of the IP address displayed. Use this IP address when you connect XenCenter to the
XenServer host.
Install XenCenter
XenCenter must be installed on a Windows machine that can connect to the XenServer host through
your network. Ensure that .NET framework version 4.8 or above is installed on this system.
To install XenCenter:
1. Download the installer for the latest version of XenCenter from the XenServer download page.
2. Launch the installer .msi file.
3. Follow the Setup wizard, which allows you to modify the default destination folder and then to
install XenCenter.
For more information about using XenCenter, see the XenCenter documentation.
Your newly installed XenServer hosts can run in Trial Edition without a license. This edition restricts
your pool size and doesn’t allow rolling pool upgrade through XenCenter. For more information, see
http://www.xenserver.com/editions.
For information about licensing your XenServer hosts, see Licensing XenServer.
In addition to a standard manual installation process, XenServer provides the ability to perform vari‑
ous other types of installations, including the following:
XenServer supports booting hosts using either UEFI or BIOS boot mode. UEFI Secure Boot is not cur‑
rently available for XenServer hosts.
Note:
Booting XenServer hosts in BIOS mode is now deprecated. You can still install your XenServer 8
hosts in BIOS boot mode. However, doing so can prevent you from upgrading your XenServer 8
hosts to a future version of XenServer. We recommend that you install your XenServer 8 hosts by
using UEFI boot mode.
The server boot mode changes how you initiate the installation process. After the installer starts, the
installation process is the same for both boot modes.
When upgrading your XenServer hosts, ensure that the upgrade uses the same boot mode as the initial
install.
Network installation
If the server that you want to install on has a PXE boot‑enabled Ethernet card, you can use this feature
to do a network installation with PXE boot.
Using PXE boot to install from the network involves the following steps:
• Copy the installer files to a TFTP server and configure your TFTP and DHCP servers for PXE boot
installation. The method for doing this depends on your boot mode: BIOS or UEFI.
• Host your installation media on NFS, FTP, or HTTP. Only the installer files are accessed from the
TFTP server. The XenServer files to be installed on the server are hosted on an NFS, FTP, or HTTP
server. Alternatively, after you start the install through PXE boot, you can complete it from local
media hosted on the target server.
• Create an answer file for unattended installation. You can instead choose to do an attended
installation and step through the installer manually.
Note:
PXE boot is not supported over a tagged VLAN network. Ensure that the VLAN network you use
for PXE boot is untagged.
Before you set up the XenServer installation media, configure your TFTP and DHCP servers. The fol‑
lowing sections contain information on how to configure your TFTP server for PXE boot with BIOS or
UEFI. Consult your vendor documentation for general setup procedures.
Note:
Booting XenServer hosts in BIOS mode is now deprecated. We recommend that you install your
XenServer 8 hosts by using UEFI boot mode.
Host the installer files on a TFTP server and configure your TFTP server to enable PXE booting with
BIOS boot mode. This configuration is used to start the installation process.
1. In your TFTP root directory (for example, /tftpboot), create a directory called xenserver.
2. From the XenServer installation media, copy the mboot.c32 and pxelinux.0 files from the
/boot/pxelinux directory of your installation media to the TFTP root directory.
Note:
We strongly recommend using mboot.c32 and pxelinux.0 files from the same source
(for example, from the same XenServer installation ISO).
3. From the XenServer installation media, copy the files to the new xenserver directory on the
TFTP server:
4. In the TFTP root directory (for example, /tftpboot), create a directory called pxelinux.
cfg.
The content of this file depends on how you want to configure your PXE boot environment and
on the values that are appropriate for your servers.
1 default xenserver-auto
2 label xenserver-auto
3 kernel mboot.c32
4 append xenserver/xen.gz dom0_max_vcpus=1-16 \
5 dom0_mem=max:8192M com1=115200,8n1 \
6 console=com1,vga --- xenserver/vmlinuz \
7 console=hvc0 console=tty0 \
8 answerfile=<http://pxehost.example.com/
answer_file> \
9 answerfile_device=<device> \
10 install --- xenserver/install.img
Note:
To specify which network adapter to use to retrieve the answer file, include the
answerfile_device=ethX or answerfile_device=MAC parameter and
specify either the Ethernet device number or the MAC address of the device.
For more information about using an answer file, see Create an answer file for unattended
installation.
• Example: Manual install This example configuration starts an installation that boots from
the TFTP server and requires manual responses:
1 default xenserver
2 label xenserver
3 kernel mboot.c32
4 append xenserver/xen.gz dom0_max_vcpus=1-16 \
5 dom0_mem=max:8192M com1=115200,8n1 \
6 console=com1,vga --- xenserver/vmlinuz \
7 console=hvc0 console=tty0 \
8 --- xenserver/install.img
For more information about PXE configuration file contents, see the SYSLINUX website.
Next step: Host your installation media on NFS, FTP, or HTTP. In addition to the TFTP and DHCP
servers, you require an NFS, FTP, or HTTP server to house the XenServer files that are installed on
your server.
Configure your TFTP server for PXE boot with UEFI Host the installer files on a TFTP server and
configure your DHCP and TFTP servers to enable PXE booting with UEFI boot mode. This configuration
is used to start the installation process.
1. In the TFTP root directory (for example, /tftpboot), create a directory called EFI/
xenserver.
2. Copy the following files from the XenServer installation media to the new EFI/xenserver
directory on the TFTP server:
4. In the EFI/xenserver directory on the TFTP server, create the grub.cfg file.
The content of this file depends on how you want to configure your PXE boot environment and
on the values that are appropriate for your servers.
Note:
To specify which network adapter to use to retrieve the answer file, include the
answerfile_device=ethX or answerfile_device=MAC parameter and
specify either the Ethernet device number or the MAC address of the device.
For more information about using an answer file, see Create an answer file for unattended
installation.
• Example: Manual install This example configuration starts an installation that boots from
the TFTP server and requires manual responses:
Next step: Host your installation media on NFS, FTP, or HTTP. In addition to the TFTP and DHCP
servers, you require an NFS, FTP, or HTTP server to house the XenServer files that are installed on
your server.
The TFTP server hosts the files needed to start the installer, but the files to be installed are hosted on
an NFS, FTP, or HTTP server.
You can also use files hosted on NFS, FTP, or HTTP to complete an installation that has been started
from local media on your server.
1. On the HTTP, FTP, or NFS server, create a directory from which the XenServer installation media
can be exported through HTTP, FTP, or NFS.
2. Copy the entire contents of the XenServer installation media to the newly created directory on
the HTTP, FTP, or NFS server. This directory is your installation repository.
Note:
When copying the XenServer installation media, ensure that you copy the file .treeinfo
to the newly created directory.
If you are using IIS to host the installation media, ensure that double escaping is enabled
on IIS before extracting the installation ISO on it.
Next step:
• If you are completing an unattended installation: Create an answer file for unattended installa‑
tion.
• If you are using PXE boot to start a manual installation: Start the network installation.
Contain all nodes within a root node named installation. When constructing your answer file, refer to
the Answer file reference.
1 <?xml version="1.0"?>
2 <installation srtype="ext">
3 <primary-disk>sda</primary-disk>
4 <guest-disk>sdb</guest-disk>
5 <guest-disk>sdc</guest-disk>
6 <keymap>us</keymap>
7 <root-password>mypassword</root-password>
8 <source type="url">http://pxehost.example.com/xenserver/</
source>
9 <script stage="filesystem-populated" type="url">
10 http://pxehost.example.com/myscripts/post-install-script
11 </script>
12 <admin-interface name="eth0" proto="dhcp" />
13 <timezone>Europe/London</timezone>
14 </installation>
Automated upgrades with an answer file You can also perform automated upgrades by changing
the answer file appropriately.
For example:
1 <?xml version="1.0"?>
2 <installation mode="upgrade">
3 <existing-installation>sda</existing-installation>
4 <source type="url">http://pxehost.example.com/xenserver/</source>
5 <script stage="filesystem-populated" type="url">
6 http://pxehost.example.com/myscripts/post-install-script
7 </script>
8 </installation>
Answer file reference The following is a summary of the elements. All node values are text, unless
otherwise stated. Required elements are indicated.
Description: The root element that contains all the other elements.
Attributes:
srtype
The attribute srtype can have one of the following values: lvm, ext, or xfs:
To enable thin provisioning, you can specify the srtype attribute as ext or xfs. If you do not specify
the srtype attribute, the default value for srtype is lvm. If you do not specify the srtype attribute
but you configure a 4 KB native disk for local storage in your answer file, the default value is xfs.
Note:
You cannot use Local LVM or Local EXT3/EXT4 storage types with 4 KB physical blocks. If you
attempt to specify lvm or ext for the srtype attribute whilst configuring 4 KB physical blocks,
your answer file configuration is rejected as incompatible.
mode
To change the installation type to upgrade, specify a mode attribute with the value upgrade. If this
attribute is not specified, the installer performs a fresh installation and overwrites any existing data
on the server.
Description: The source of a supplemental pack containing device drivers to be loaded by the installer
and included after installation of the main repository.
Attributes: None
Description: The name of the storage device where the control domain is installed. This element is
equivalent to the choice made on the Select Primary Disk step of the manual installation process.
Attributes: You can specify a guest-storage attribute with possible values yes and no.
For example: <primary-disk guest-storage="no">sda</primary-disk>
The default value is yes. If you specify no, you can automate an installation scenario where no storage
repository is created. In this case, specify no guest‑disk keys.
<guest-disk> Required? No
Description: The name of a storage device to be used for storing guests. Use one of these elements
for each extra disk.
Attributes: None
Description: Specifies the source for NTP servers. If the <ntp> element is not specified, the default
shall be manual if <ntp-server> is specified, dhcp if using DHCP, otherwise default.
Attributes:
The attribute source can have one of the following values: dhcp, default, manual, or none.
<ntp-server> Required? No
Description: Specifies one or more NTP servers. To be used only with the ntp element and the at‑
tribute manual.
Attributes: None
<keymap> Required? No
Description: The name of the key map to use during installation. <keymap>us</keymap> The
default value, us is considered if you do not specify a value for this element.
Attributes: None
<root-password> Required: No
Description: The desired root password for the XenServer host. If a password is not provided, a
prompt is displayed when the host is first booted.
For example:
1 <root-password type="hash">hashedpassword</root-password>
The hashed value can use any hash type supported by crypt(3) in glibc. The default hash type
is SHA‑512.
You can use the following Python code to generate a hashed password string to include in the answer
file:
Description: The location of the uploaded XenServer installation media or a Supplemental Pack. This
element can occur multiple times.
Attributes: The attribute type can have one of the following values: url, nfs, or local.
1 <source type="url">http://server/packages</source>
2 <source type="local" />
3 <source type="nfs">server:/packages</source>
<script> Required: No
Attributes:
The attribute stage can have one of the following values: filesystem-populated,
installation-start, or installation-complete.
• When the value filesystem-populated is used, the script runs just before the root file sys‑
tem is unmounted (for example, after installation/upgrade, initrds already built, and so on). The
script receives an argument that is the mount point of the root file system.
• When the value installation-start is used, the script runs before starting the main in‑
stallation sequence, but after the installer has initialized, loaded any drivers, and processed the
answerfile. The script does not receive any arguments.
• When the value installation-complete is used, the script runs after the installer has fin‑
ished all operations (and hence the root file system is unmounted). The script receives an argu‑
ment that has a value of zero if the installation completed successfully, and is non‑zero if the
installation failed for any reason.
The attribute type can have one of the following values: url, nfs, or local.
If the value is url or nfs, put the URL or NFS path in the PCDATA. If the value is local, leave the
PCDATA empty. For example,
Note:
If a local file is used, ensure that the path is absolute. This generally means that the file://
prefix is followed by another forward slash, and then the complete path to the script.
Description: The single network interface to be used as the host administration interface.
Attributes:
Specify one of the following attributes:
The attribute proto can have one of the following values: dhcp or static.
If you specify proto="static", you must also specify all of these child elements:
Child elements
• <ipaddr>: The IP address
• <subnet>: The subnet mask
• <gateway>: The gateway
<timezone> Required: No
Description: The timezone in the format used by the TZ variable, for example Europe/London, or
America/Los_Angeles. The default value is Etc/UTC.
<name-server> Required: No
Description: The IP address of a nameserver. Use one of these elements for each nameserver you
want to use.
<hostname> Required: No
Description: Specify this element if you want to manually set a host name.
<ntp-server> Required: No
After setting up the network servers required for a PXE boot installation, complete the following steps
on the server that you are installing onto:
1. Start the system and enter the boot menu (F12 in most BIOS programs).
3. The system then PXE boots from the installation source you set up and the installation script
starts.
Boot‑from‑SAN environments offer several advantages, including high performance, redundancy, and
space consolidation. In these environments, the boot disk is on a remote SAN and not on the local
host.
For a fully redundant boot‑from‑SAN environment, you must configure multiple paths for I/O access.
For more information, see Enable multipathing.
This type of boot‑from‑SAN deployment depends on SAN‑based disk arrays with either hardware Fibre
Channel or HBA iSCSI adapter support on the host. The host communicates with the SAN through a
host bus adapter (HBA). The HBA’s BIOS contains the instructions that enable the host to find the boot
disk.
All of the configuration to set up boot from SAN through hardware Fibre Channel or an HBA adapter
is done in your network infrastructure before you install XenServer on your servers. For information
about how to complete this set up, see the documentation provided by the vendor.
After your network infrastructure is correctly set up, enable multipathing on your servers during the
XenServer installation process. For more information, see Enable multipathing. Proceed with the
installation as normal.
You can boot a XenServer host from an FCoE SAN by using a software FCoE stack.
For this type of boot‑from‑SAN deployment, before installing your XenServer host, manually complete
the configuration required to expose a LUN to the host. This manual configuration includes configur‑
ing the storage fabric and allocating LUNs to the public worldwide name (PWWN) of your SAN. After
you complete this configuration, the available LUN is mounted to the CNA of the host as a SCSI device.
The SCSI device can then be used to access the LUN as if it were a locally attached SCSI device. When
you configure the FCoE fabric, do not use VLAN 0. The XenServer host cannot find traffic that is on
VLAN 0.
For information about configuring the physical switch and the array to support FCoE, see the docu‑
mentation provided by the vendor.
After your network infrastructure is correctly set up, enable multipathing on your servers during the
XenServer installation process. For more information, see Enable multipathing. Proceed with the
installation as normal.
During a manual installation of XenServer, you are given the option on the Welcome to XenServer
Setup screen to set up advanced storage classes. Press F10 and follow the instructions displayed on
the screen to set up software FCoE.
The software‑boot‑from‑iSCSI feature enables customers to install and boot XenServer from SAN us‑
ing iSCSI. Using this feature, XenServer can be installed to, booted from, and run from a LUN provided
by an iSCSI target. The iSCSI target is specified in the iSCSI Boot Firmware Table. This capability al‑
lows the root disk to be attached through iSCSI. This boot disk can be located on the same target that
provides an SR.
To use this feature, ensure that your environment meets the following requirements:
• The network interface or interfaces dedicated to iSCSI boot must be separate from the manage‑
ment interfaces and interfaces used for VM traffic.
• Storage (iSCSI targets) must be on a separate Layer 3 (IP) network to all other network interfaces
with IP addresses on the host.
• Do not use tagged VLAN for the network interfaces dedicated to the iSCSI boot targets.
To configure the software‑boot‑from‑iSCSI feature, you must add the use_ibft parameter to your
boot parameters. How you add this parameter depends on your boot mode and the type of installation
you are doing.
Enable the software‑boot‑from‑iSCSI feature on a UEFI boot server during an installation from
local media
1. Boot the computer from the installation media. For more information, see Install the XenServer
host.
Following the initial boot messages, you see a GRUB menu. This menu is shown for 5 seconds.
Using the cursor keys, edit this line to include use_ibft at the end:
5. Press Enter.
Enable the software‑boot‑from‑iSCSI feature on a BIOS boot server during an installation from
local media
Note:
Booting XenServer hosts in BIOS mode is now deprecated. We recommend that you install your
XenServer 8 hosts by using UEFI boot mode.
1. Boot the computer from the installation media. For more information, see Install the XenServer
host.
Following the initial boot messages, you see the Welcome to XenServer screen.
1 --- /install.img
6. Press Enter.
Enable the software‑boot‑from‑iSCSI feature on a UEFI boot server during a PXE boot installa‑
tion When installing using PXE, ensure that you add the keyword use_ibft in the kernel parameters.
If multipathing is required, you must add device_mapper_multipath=enabled.
For example:
For more information about setting up PXE boot, see Configure your TFTP server for PXE boot with
UEFI.
Enable the software‑boot‑from‑iSCSI feature on a BIOS boot server during a PXE boot installa‑
tion
Note:
Booting XenServer hosts in BIOS mode is now deprecated. We recommend that you install your
XenServer 8 hosts by using UEFI boot mode.
When installing using PXE, ensure that you add the keyword use_ibft in the kernel parameters. If using
multipathing (recommended) you must add device_mapper_multipath=enabled.
For example:
1 default xenserver-auto
2 label xenserver-auto
3 kernel mboot.c32
4 append xenserver/xen.gz dom0_max_vcpus=1-16 \
5 dom0_mem=max:8192M com1=115200,8n1 \
6 console=com1,vga --- xenserver/vmlinuz \
7 console=hvc0 console=tty0 \
8 answerfile=<http://pxehost.example.com/answer_file> \
9 answerfile_device=<device> \
10 use_ibft device_mapper_multipath=enabled --- xenserver/install.img
For more information about setting up PXE boot, see Configure your TFTP server for PXE boot with
BIOS.
Enable multipathing
For a fully redundant boot‑from‑SAN environment, you must configure multiple paths for I/O access.
To do so, ensure that the root device has multipath support enabled.
For information about whether multipath is available for your SAN environment, consult your storage
vendor or administrator.
Warning:
Multipath settings are not inherited during the upgrade process. When upgrading using the ISO
or network boot, follow the same instructions as used in the following installation process to
ensure that multipath is correctly configured.
If you have multiple paths available, enable multipathing in your XenServer deployment while initial‑
izing the installation process. How you enable multipathing depends on your boot mode and the type
of installation you are doing.
1. Boot the computer from the installation media. For more information, see Install the XenServer
host.
Following the initial boot messages, you see a GRUB menu. This menu is shown for 5 seconds.
The XenServer installation process configures the XenServer host, which boots from a remote SAN
with multipathing enabled.
Note:
Booting XenServer hosts in BIOS mode is now deprecated. We recommend that you install your
XenServer 8 hosts by using UEFI boot mode.
1. Boot the computer from the installation media. For more information, see Install the XenServer
host.
Following the initial boot messages, you see the Welcome to XenServer screen.
The XenServer installation process configures the XenServer host, which boots from a remote SAN
with multipathing enabled.
Enable multipathing on a UEFI boot server during an unattended installation To enable file sys‑
tem multipathing during PXE installation, add device_mapper_multipath=enabled to your
configuration file.
For example:
For more information about setting up PXE boot, see Configure your TFTP server for PXE boot with
UEFI.
Note:
Booting XenServer hosts in BIOS mode is now deprecated. We recommend that you install your
XenServer 8 hosts by using UEFI boot mode.
For example:
1 default xenserver-auto
2 label xenserver-auto
3 kernel mboot.c32
4 append xenserver/xen.gz dom0_max_vcpus=1-16 \
5 dom0_mem=max:8192M com1=115200,8n1 \
6 console=com1,vga --- xenserver/vmlinuz \
7 console=hvc0 console=tty0 \
8 answerfile=<http://pxehost.example.com/answer_file> \
9 answerfile_device=<device> \
10 device_mapper_multipath=enabled \
11 install --- xenserver/install.img
For more information about setting up PXE boot, see Configure your TFTP server for PXE boot with
BIOS.
Supplemental packs are used to modify and extend the capabilities of XenServer by installing software
into the control domain (dom0). For example, an OEM partner might want to ship XenServer with a set
of management tools that require SNMP agents to be installed. You can install a supplemental pack
either during initial XenServer installation, or any time afterwards on a running XenServer instance.
When installing supplemental packs during XenServer installation, unpack each supplemental pack
into a separate directory on a web server.
You can install the supplemental pack in one of the following ways:
• During an interactive installation, when you are prompted to install supplemental packs, specify
the URL to the supplemental pack media.
• If you are using an answer file for your install, add an additional <source> element to specify
the location of the supplemental pack.
You can install a driver disk using one of the following methods:
For information on how to install a driver disk by using XenCenter, see Install driver disks. For infor‑
mation on how to install a driver disk during a clean XenServer installation, see Install the XenServer
host.
After installing the driver, restart your server for the new version of the driver to take effect. As with
any software update, we advise you to back up your data before installing a driver disk.
Perform the following steps to install the driver disk remotely using the xe CLI:
1. Download the driver disk to a known location on a computer that has the remote xe CLI installed.
For the next step, ensure that you use the driver ISO and not the ISO that contains the source
files.
The UUID of the driver disk is returned when the upload completes.
5. To complete the installation, restart the host. The driver does not take effect until after the host
is restarted.
August 6, 2024
By upgrading from an existing installation of Citrix Hypervisor 8.2 Cumulative Update 1 to XenServer
8, you can retain your existing VMs, SRs, and configuration.
Perform a rolling pool upgrade to keep all the services and resources offered by the pool available
while upgrading all hosts in the pool. This upgrade method only takes one XenServer host offline at a
time. Critical VMs are kept running during the process by live migrating the VMs to other hosts in the
pool.
You can complete a rolling pool upgrade in one of the following ways:
• If you have a Premium Edition license, you can use the XenCenter Rolling Pool Upgrade wiz‑
ard. This wizard organizes the upgrade path automatically and guides you through the upgrade
procedure.
• You can use the xe CLI to perform a rolling pool upgrade manually by live migrating running VMs
between XenServer hosts accordingly.
For more information, see Rolling pool upgrade by using the xe CLI.
Can I upgrade?
• Are your hosts currently running Citrix Hypervisor 8.2 Cumulative Update 1?
If not, you cannot upgrade directly to XenServer 8. Instead, perform a clean installation. For
more information, see Install.
If you are already using XenServer 8, do not attempt to update by using the installation ISO.
Instead, apply updates to get your XenServer 8 pool to the latest level. For more information,
see Apply updates.
The legacy partition layout is no longer supported. If you use it, you might not be able to up‑
grade to XenServer 8. For more information, see Legacy partition layout.
In previous releases, we supported the Linux‑based License Server virtual appliance. This prod‑
uct is no longer supported. If you are using the License Server virtual appliance with an exist‑
ing pool, migrate to the latest version of Citrix License Server for Windows before upgrading to
XenServer 8. For more information, see Licensing.
• Is the key size of the server’s identity certificate smaller than 2048 bytes?
If your pool was first installed using XenServer 7.6 or earlier, it might still have certificates with
a smaller key size than 2048 bytes. In this case, when you attempt to upgrade to XenServer 8,
the upgrade wizard shows an error during prechecks. To proceed with the upgrade, you must
reset the self‑signed certificate on each affected server by running the following command:
1 xe host-emergency-reset-server-certificate
Check that the hardware your pool is installed on is compatible with the version of XenServer
you are about to upgrade to. For more information, see the Hardware Compatibility List (HCL).
Check that the operating systems of your VMs are supported by XenServer 8. If your VM operat‑
ing system is not supported, upgrade your VM operating system to a supported version before
upgrading XenServer. For more information, see Guest operating system support.
• Are you using XenServer to host your Citrix Virtual Apps and Desktops workloads?
If you use your Citrix Virtual Apps and Desktops license to license your Citrix Hypervisor 8.2 Cu‑
mulative Update 1, this license no longer applies to XenServer 8. You must get a Xenserver Pre‑
mium Edition license instead. For more information about getting a XenServer license, see the
XenServer website.
XenServer is now an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid Multi‑
Cloud, Citrix Universal MSP, and Citrix Platform License subscriptions for running your Citrix
workloads. Read more.
Apply your new licenses to your pool before beginning the upgrade.
You can upgrade to XenServer 8 by using the methods described in this article. However,
depending on your XenServer environment and your Citrix Virtual Apps and Desktops work‑
load, there might be specific behaviors and requirements to consider that can optimize your
XenServer upgrade process. For more information, see Upgrade scenarios for Citrix Virtual
Apps and Desktops.
Review the following information before starting your upgrade. Take the necessary steps to ensure
that your upgrade process is successful.
1. Map your upgrade path carefully. Upgrading XenServer hosts, and particularly a pool of
XenServer hosts, requires careful planning and attention to avoid losing any existing data.
2. Ensure that your servers are not over‑provisioned: check that servers have sufficient memory
to carry out the upgrade.
Generally, if N equals the total number of servers in a pool, there must be sufficient memory
across N‑1 servers to run all live VMs in the pool. It is best to suspend any non‑critical VMs during
the upgrade process.
3. Ensure that your pool has shared storage to keep your VMs running during a rolling pool up‑
grade. If your pool does not have shared storage, you must suspend your VMs before upgrading
because the VMs cannot be live migrated.
4. If you use your Citrix Virtual Apps and Desktops license to license your Citrix Hypervisor 8.2 Cu‑
mulative Update 1, apply a Xenserver Premium Edition license to all hosts in the pool instead.
For more information about getting a XenServer license, see the XenServer website.
5. If you perform a rolling pool upgrade from Citrix Hypervisor 8.2 CU1 to XenServer 8, you cannot
use Workload Balancing 8.2.2 and earlier with your XenServer 8 pools. Update your Workload
Balancing virtual appliance to version 8.3.0 before performing the rolling pool upgrade. You can
download the latest version of the Workload Balancing virtual appliance from the XenServer
Downloads page.
• The upgrade must use the same boot mode as the initial install.
• Boot‑from‑SAN settings are not inherited during the manual upgrade process. When up‑
grading using the ISO or PXE process, you must ensure that multipathd is correctly con‑
figured. For more information, see Boot from SAN.
• When you upgrade XenServer, previously applied supplemental packs are removed and
so they must be reapplied during or after the upgrade. However, the PVS‑Accelerator sup‑
plemental pack is no longer required to be installed on XenServer 8. Its features are now
included in the main product installation.
1. Take a backup of the state of your existing pool using the xe CLI command xe pool-dump-
database.
Taking a backup of the state ensures that you can revert a partially complete rolling upgrade to
its original state without losing VM data.
1. If you have Windows VMs running in your pool, take the following steps for each VM:
• Ensure that the latest version of the XenServer VM Tools for Windows is installed.
• Take a snapshot of the VM.
2. If you have Linux VMs running in your pool, ensure that the latest version of the XenServer VM
Tools for Linux is installed.
3. If you have NVIDIA vGPU‑enabled VMs running on your pool, complete the following steps to
migrate the pool while these VMs are running:
a) Ensure that the GPU you are using is supported on the version you plan to upgrade to.
b) Identify a version of the NVIDIA GRID drivers that is available for both your current version
of Citrix Hypervisor or XenServer and the version of XenServer you are upgrading to. If
possible, choose the latest available drivers.
c) Install the new GRID drivers on your XenServer hosts and the matching guest drivers on
any of your vGPU‑enabled VMs.
d) Ensure that you also have the version of the GRID driver that matches the XenServer ver‑
sion that you are upgrading to. You are prompted to install these drivers as a supplemental
pack as part of the rolling pool upgrade process.
1. If you are using XenCenter to upgrade your hosts, download and install the latest version of
XenCenter from the XenServer download site.
2. Download the XenServer 8 installation ISO from the XenServer download site.
• To upgrade your hosts from a bootable USB, use a tool like rufus or diskpart to create
a bootable USB by using the XenServer 8 installation ISO. Ensure that the tool does not
alter the contents of the ISO file.
• To upgrade your hosts from a CD, burn the XenServer 8 installation ISO file to a CD.
• To upgrade your hosts from virtual media, go to the virtual console of your system and
mount the XenServer installation ISO file as virtual media.
b) Set up a network location where you can access the installation ISO through HTTP,
FTP, or NFS.
If you are using IIS to host the installation media, ensure that double escaping is en‑
abled on IIS before extracting the installation ISO on it.
– For HTTP or FTP, make note of the URL for your HTTP or FTP repository, and a user
name and password, if appropriate.
– For NFS, make note of the server and path of your NFS share.
After these prerequisite steps are completed, you can perform a rolling pool upgrade by one of the
following methods:
The Rolling Pool Upgrade wizard guides you through the upgrade procedure and organizes the up‑
grade path automatically. For pools, each of the servers in the pool is upgraded in turn, starting with
the pool
coordinator. Before starting an upgrade, the wizard conducts a series of prechecks. These prechecks
ensure certain pool‑wide features, such as high availability, are temporarily disabled and that each
server in the pool
is prepared for upgrade. Only one server is offline at a time. Any running VMs are automatically mi‑
grated off each server before the upgrade is installed on that server.
Note:
The XenCenter Rolling Pool Upgrade wizard is only available if you have a Premium Edition
license.
If you have not yet installed XenCenter, download the latest version from the XenServer download site
and complete the steps in Install XenCenter.
Note:
Use the latest XenCenter to upgrade from Citrix Hypervisor 8.2 CU1 to XenServer 8. Using an older
version of XenCenter can result in a loss of connectivity.
Download the latest XenCenter from the XenServer product downloads page.
• In manual mode, you must manually run the XenServer installer on each server in turn and fol‑
low the on‑screen instructions on the serial console of the server. When the upgrade begins,
XenCenter prompts you to insert the installation media or specify a network boot server for
each server that you upgrade.
• In automatic mode, the wizard uses network installation files on an HTTP, NFS, or FTP server to
upgrade each server in turn. This mode doesn’t require you to insert installation media, manu‑
ally reboot, or step through the installer on each server. If you perform a rolling pool upgrade in
this manner, you must unpack the installation media onto your HTTP, NFS, or FTP server before
starting the upgrade.
To upgrade XenServer hosts by using the XenCenter Rolling Pool Upgrade wizard:
3. Select the pools and any individual hosts that you want to upgrade, and then click Next.
• Automatic Mode for an automated upgrade from network installation files on an HTTP,
NFS, or FTP server.
If you choose Automatic Mode and are using IIS to host the installation media, ensure that
double escaping is enabled on IIS before extracting the installation ISO on it.
• Manual Mode for a manual upgrade either from a USB/CD/DVD or by using network boot
(using existing infrastructure).
If you choose Manual Mode, you must run the XenServer installer on each host in turn. Fol‑
low the on‑screen instructions on the serial console of the host. When the upgrade begins,
XenCenter prompts you to insert the XenServer installation media or specify a network
boot server for each host that you upgrade.
5. After you have selected your upgrade mode, click Run Prechecks.
6. Follow the recommendations to resolve any upgrade prechecks that have failed. If you want
XenCenter to resolve all failed prechecks automatically, click Resolve All.
Note:
Some prechecks cannot be resolved automatically. For example, if your hosts are using a
Citrix Virtual Apps and Desktops license, XenCenter shows that this license does not apply
to XenServer 8 hosts. You can’t upgrade until you get a XenServer Premium Edition license.
For more information about getting a XenServer license, see the XenServer website.
XenServer is now an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid
Multi‑Cloud, Citrix Universal MSP, and Citrix Platform License subscriptions for running
your Citrix workloads. Read more.
• If you chose Automatic Mode, enter the installation media details. Choose HTTP, NFS, or
FTP and then specify the URL, user name, and password, as appropriate.
Notes:
– If you choose FTP, ensure that you escape any leading slashes that are in the file
path section of the URL.
– Enter the user name and password associated with your HTTP or FTP server, if
you have configured security credentials. Do not enter the user name and pass‑
word associated with your XenServer pool.
• If you chose Manual Mode, note the upgrade plan and follow the instructions.
10. When the upgrade begins, the Rolling Pool Upgrade wizard guides you through any actions you
must take to upgrade each host. Follow the instructions until you have upgraded and updated
all hosts in the pools.
11. If you have vGPU‑enabled VMs, when you reach the step that gives you the option to supply a
supplemental pack, upload the NVIDIA driver that matches the one on your vGPU‑enabled VMs.
Ensure you upload the version of the driver for the XenServer version you are upgrading to.
12. The Rolling Pool Upgrade wizard prints a summary when the upgrade is complete. Click Finish
to close the wizard.
Note:
If the upgrade or the update process fails for any reason, the Rolling Pool Upgrade wizard halts
the process. This allows you to fix the issue and resume the upgrade or update process by clicking
the Retry button.
After your pool is upgraded, we recommend that you complete the following tasks:
• Enable the certificate verification feature. For more information, see Certificate verification.
• Configure updates and apply the latest set. For more information, see Update your XenServer
hosts.
After a rolling pool upgrade is complete, a VM might not be located on its home host. To relocate the
VM, you can do one of the following actions:
Before performing a rolling pool upgrade by using the xe CLI, ensure that you have completed all the
prerequisite steps in Before you start.
Important:
Ensure that you upgrade all servers in your pool. We strongly advise against running a mixed‑
mode pool (one with multiple XenServer versions) for longer than necessary, as the pool oper‑
ates in a degraded state during upgrade.
Key control operations are not available during the upgrade process. Do not attempt to perform
any control operations. Though VMs continue to function as normal, VM actions other than mi‑
grate are not available (for example, shut down, copy and export). In particular, it is not safe to
perform storage‑related operations such as adding, removing, or resizing virtual disks.
1. Disable the pool coordinator. This prevents any new VMs from starting on or being migrated to
the specified host.
1 xe host-disable host-selector=<host_selector_value>
2. Ensure that no VMs are running on the pool coordinator. Shut down, suspend, or migrate VMs
to other hosts in the pool.
1 xe vm-shutdown
1 xe vm-suspend
1 xe vm-migrate
Migrating specified VMs to specified hosts gives you full control over the distribution of
migrated VMs to other hosts in the pool.
1 xe host-evacuate
Evacuating all VMs from a host leaves the distribution of migrated VMs to XenServer.
1 xe host-shutdown
Important:
You are unable to contact the pool coordinator until the upgrade of the pool coordinator
is complete. Shutting down the pool coordinator causes the other hosts in the pool to en‑
ter emergency mode. Hosts can enter emergency mode when they in a pool whose pool
coordinator has disappeared from the network and cannot be contacted after several at‑
tempts. VMs continue to run on hosts in emergency mode, but control operations are not
available.
4. Boot the pool coordinator using the XenServer installation media and method of your choice
(such as, USB or network).
5. Follow the XenServer installation procedure until the installer offers you the option to upgrade.
Choose to upgrade.
When your pool coordinator restarts, the other hosts in the pool leave emergency mode and
normal service is restored after a few minutes.
7. Migrate any VMs that you want back to the pool coordinator.
If anything interrupts the upgrade of the pool coordinator or if the upgrade fails for any reason, do not
attempt to proceed with the upgrade. Reboot the pool coordinator and restore to a working version.
Repeat these steps for all the other hosts in the pool:
1. Select the next XenServer host in your upgrade path. Disable the host.
1 xe host-disable host-selector=<host_selector_value>
2. Ensure that no VMs are running on the host. Shut down, suspend, or migrate VMs to other hosts
in the pool.
1 xe vm-shutdown
1 xe vm-suspend
1 xe vm-migrate
Migrating specified VMs to specified hosts gives you full control over the distribution of
migrated VMs to other hosts in the pool.
• To evacuate the host, use the following command:
1 xe host-evacuate
Evacuating all VMs from a host leaves the distribution of migrated VMs to XenServer.
1 xe host-shutdown
4. Boot the host using the XenServer installation media and method of your choice (such as, USB
or network).
5. Follow the XenServer installation procedure until the installer offers you the option to upgrade.
Choose to upgrade.
6. After the host upgrade is complete, start or resume any shutdown or suspended VMs.
7. Migrate any VMs that you want back to the host.
If the upgrade of a subordinate host fails or is interrupted, you do not have to revert. Run the command
xe host-forget in the pool to forget that host. Reinstall XenServer on the host, and then join it,
as a new host, to the pool using the command xe pool-join.
After your pool is upgraded, we recommend that you complete the following tasks:
• Enable the certificate verification feature. For more information, see Certificate verification.
• Configure updates and apply the latest set. For more information, see Update your XenServer
hosts.
After a rolling pool upgrade is complete, a VM might not be located on its home host. To relocate the
VM, you can do one of the following actions:
Other scenarios
The legacy partition layout is no longer supported. If you use it, you might not be able to upgrade to
XenServer 8 and must instead perform a fresh installation.
XenServer 6.5 and earlier uses a 4 GB control domain (dom0) partition for all dom0 functions, includ‑
ing swap and logging. This partition configuration is referred to as the legacy partition layout. Later
releases of XenServer and Citrix Hypervisor introduced a partition layout that increased the control
domain partition to 18 GB and included a separate logging partition. In XenServer 8, only the newer
partition layout is supported.
How do I know what partition layout my server uses? You might have the legacy partition layout
on your XenServer hosts in the following cases:
• You initially installed your XenServer host with XenServer 5.6 Service Pack 2 or earlier and have
since upgraded to later supported versions.
• You are using old hardware that has less than 46 GB of primary disk space.
To find out how many partitions your XenServer host has, run the following command in the server
console:
1 fdisk -l
• If the command lists 6 partitions, you are using the new partition layout and can upgrade to
XenServer 8.
• If the command lists 3 or 4 partitions, you are using the legacy partition layout.
What can I do next? If you are using the new partition layout, you can upgrade to XenServer 8.
• If you have less than 46 GB of primary disk space or your hardware requires that a utility partition
is present, you cannot install or upgrade to XenServer 8.
• If your disk is GPT and the local SR is empty with at least 38 GB free, you can switch from the
legacy partition layout to the new partition layout during upgrade. You must use XenCenter to
attempt the upgrade on a server with the legacy partition layout. For more information, see
Rolling pool upgrade by using XenCenter.
• For other hardware, you can complete a fresh installation of XenServer 8. For more information,
see Install.
If you are using XenServer to host your Citrix Virtual Apps and Desktops workloads, see Upgrade sce‑
narios for Citrix Virtual Apps and Desktops.
With XenServer 8, new features and bug fixes are frequently pushed to the content delivery network
(CDN) as available updates for your XenServer hosts and pools, allowing you to benefit from a more
efficient release process that delivers new content to you at a faster cadence than was previously pos‑
sible.
To ensure that you are always on the latest and greatest update, there is no picking and choosing ‑
when you apply updates to your pool, it is updated to the latest, fully tested state. Configure your pool
to automatically synchronize with an update channel. This action downloads all available updates to
the pool coordinator. You can then apply all downloaded updates by using XenCenter or the xe CLI.
Note:
If you used XenServer 8 during its preview period, you do not need to reinstall or upgrade your
hosts to move to the GA version. Apply the latest updates through XenCenter to be supported in
production.
Lifecycle
During its lifecycle, XenServer 8 provides a stream of frequent and easy‑to‑apply updates, which en‑
able you to consume new features and bug fixes at the earliest possible juncture. You must apply all
available updates periodically. As a result, the behavior and feature set in XenServer 8 can change.
Support
XenServer 8 uses a frequent update model that delivers features, fixes, and improvements to your
hosts. We expect you to consume these updates within six months to remain in support. If the update
level of your pool is older than six months, we will ask you to reproduce the issue on the latest update
level.
Update process
The XenServer 8 release stream and the content delivery network (CDN) work together to enable you
to apply frequent updates to your XenServer hosts and pools from XenCenter.
3. Using XenCenter, initiate the process of applying updates to your XenServer pool.
Update channels
The XenServer 8 release stream consists of two phases, also referred to as update channels:
• Early Access
• Normal
To receive frequent updates, configure your XenServer pool to subscribe to one of those update chan‑
nels.
1. When updates are first pushed to our CDN, they enter the Early Access update channel.
Early Access is perfect for test environments, allowing you to get the latest updates when they’
re released to the public. By opting into receiving updates early, you have the opportunity to
trial them before they’re made available to the Normal update channel.
Note:
Early Access is supported for production use. However, we do not recommend it for critical
production environments.
2. These updates then flow sequentially into Normal, the next update channel.
Unless we have delayed this progression, you can expect to see Early Access updates become
available in Normal on a regular cadence. Normal is recommended for production environ‑
ments.
Occasionally, you might see that updates become available to both your Early Access and Normal
pools at the same time. These updates enable us to deliver security patches and critical fixes to all
update channels immediately.
For information on how to configure and apply updates for your XenServer hosts by using XenCenter,
see Apply updates by using XenCenter. Alternatively, you can use the xe CLI to apply updates to your
XenServer hosts. For more information, see Apply updates by using the xe CLI.
Important:
We do not support the direct usage or modification of the underlying update components in
dom0. You can only use XenCenter or the xe CLI to configure and apply updates.
Apply updates to your XenServer 8 hosts and pools by using the latest version of XenCenter. The latest
version of XenCenter is provided on the XenServer product downloads page.
To provide update notifications, XenCenter requires internet access. If your XenCenter is behind a
firewall, ensure that it has access to the updates.ops.xenserver.com domain. To receive the
updates, your XenServer hosts require internet access. If your hosts are behind a firewall, ensure that
they have access to subdomains of ops.xenserver.com. For more information, see Connectivity
requirements.
Before being able to apply updates to your XenServer hosts and pools, you must configure host up‑
dates by subscribing your pool or host to an update channel. These channels control how soon you
can access updates that are made available in the content delivery network (CDN).
After subscribing your pool to one of the update channels, your pool regularly and automatically syn‑
chronizes with the update channel. This action downloads all available updates to the pool coordi‑
nator. You can then apply all of the downloaded updates by using XenCenter. You must consume
these updates within six months to remain in support. If the update level of your pool is older than
six months, we will ask you to reproduce the issue on the latest update level.
1. In XenCenter, on the Tools menu, select Configure Updates. Alternatively, go to the Updates
section under your pool’s General tab and select Configure Updates or right‑click on your pool
and select Updates > Configure Updates. The Configure Server Updates window opens.
2. On the XenServer 8 tab, select the pools or hosts that you want to configure.
3. Under Update Channel, specify how soon you want to access updates. Your pool or host can
be subscribed to one of the following update channels:
• Early Access
• Normal
4. Under Synchronization Schedule, select how often you want your XenServer pool to synchro‑
nize with the update channel. This can be daily, or weekly on a certain day of the week.
Note:
• After synchronizing, apply the updates to your pool as soon as possible to benefit from
the latest updates.
• If you designate a new pool coordinator after synchronizing but before applying up‑
dates to the hosts in the pool, you must synchronize again with the new pool coordi‑
nator before you can update the pool.
• Do not synchronize your XenServer pool while the pool is in the process of being up‑
dated.
5. (Optional) Under Proxy Server, specify a proxy to use when synchronizing with the update chan‑
nel. This proxy server is used for communication between the host and the public CDN.
6. Click Apply to apply the configuration changes to your XenServer pool and then repeat the
above steps to configure updates for the rest of your XenServer pools.
7. If you are happy with the configuration changes to your pools, click OK to save your changes and
close the Configure Server Updates window. When you first set up your host or pool with an
update channel (or if you later change your host or pool to synchronize with a different update
channel), you are asked if you want to synchronize your host or pool with the update channel
immediately. In the dialog box that opens, select Yes, Synchronize if you want to synchronize
your host or pool with the update channel immediately.
8. As soon as your pool synchronizes with the update channel, apply the downloaded updates to
your pool by using the Install Updates wizard. For more information, see Apply updates to your
pool.
After configuring your XenServer pool, you can find information about the update channel that your
pool is subscribed to and the last time your pool synchronized with the update channel in the Updates
section under your pool’s General tab in XenCenter. You can also find information about the last time
your host was updated in the Updates section under your host’s General tab.
XenCenter issues notifications about available updates for your hosts and pools under the Updates
tabs in the Notifications view. The Updates tabs are split into XenServer 8 updates and Citrix Hyper‑
visor updates.
The XenServer 8 Updates tab refreshes when your XenServer 8 hosts and pools synchronize with the
update channel. The frequency of this refresh depends on the synchronization schedule that you have
set up for your pool (either daily, or weekly on a certain day of the week).
To see the latest available updates for your pool, synchronize your XenServer pool with the update
channel. You can do this from the following places:
• In the By Server view of the Updates tab, you can choose to Synchronize All to synchronize all
pools managed by XenCenter or Synchronize Selected to synchronize the selected pools.
• Alternatively, go to the Updates section under your pool’s General tab and select Synchronize
Now or right‑click on your pool and select Updates > Synchronize Now.
You can then review all updates available for your XenServer 8 pools. The types of updates are:
• Security fixes
• Bug fixes
• Improvements
• New features
• Preview features
• Foundational changes
Note:
Foundational changes are non‑customer visible groundwork changes to maintain and im‑
prove the product.
In the main panel, use the View option to choose whether the updates are displayed By Server or By
Update.
By server
You can filter the update information by server. Select an update and hover over it to view detailed
information about the update.
To view this information about your available updates offline, select Export All to export the informa‑
tion as a .md file. The contents of the .md file are grouped by pool and then host. For each host, the
file lists the following information:
• Any update tasks for this host or its VMs. For more information about mandatory, recom‑
mended, and full effectiveness tasks, see Update tasks.
• Updates grouped by update type
By update
You can filter the update information by the server it can be applied to, by the update type, and by any
update tasks that apply to it. Select an update and hover over it to view detailed information about
the update.
To view this information about your available updates offline, select Export All to export the informa‑
tion as a .csv file. The .csv file contains the following information:
For more information about mandatory, recommended, and full effectiveness tasks, see Update
tasks.
• To apply the updates to your hosts or pools, select Install Updates to open the Install Updates
wizard. For more information, see the following section Apply updates to your pool.
The update installation mechanism in XenCenter applies the updates to your hosts and pools using
the Install Updates wizard. During the process, XenCenter automatically works out the least impact‑
ful action required after applying all available updates. The Install Updates wizard automatically
performs these steps:
Any actions that are taken at the pre‑check stage to enable the updates to be applied, such as turning
off high availability, are reverted.
Before you apply an update to your servers, pay careful attention to the following:
Install updates
The following section provides step‑by‑step instructions on applying updates using the Install Up‑
dates wizard:
1. From the XenCenter menu, select Tools and then Install Updates.
2. In the Install Updates wizard, select XenServer 8 and review the information on the Before
You Start page. Click Next to continue.
4. Select your XenServer pools or hosts that you want to update. Click Next to progress to the next
wizard page and begin pre‑checks.
5. The wizard performs several pre‑checks to verify that the updates can be applied on your host
or pool. For example, you must have synchronized your host or pool with the update channel
within the past week.
Follow the on‑screen recommendations to resolve any pre‑checks that have failed. If you
prefer XenCenter to automatically resolve all failed pre‑checks, select Resolve All. When the
prechecks have been resolved, select Next to continue.
Notes:
• If the update process cannot complete for any reason, XenCenter halts the process.
This halt allows you to fix the issue and resume the update process by clicking the
Retry button.
• If you select Cancel at this stage, the Install Updates wizard reverts any changes.
6. After updates are applied, some update tasks (such as rebooting your hosts) might be required.
On the Update Mode page, select the level of update tasks that you want XenCenter to automat‑
ically carry out (such as restarting your hosts) after applying updates to your pool. By default,
XenCenter chooses the recommended level of update tasks. Mandatory tasks cannot be dese‑
lected and XenCenter performs these tasks automatically.
The mandatory, recommended, and full effectiveness update tasks are listed under Tasks. If
there are no update tasks required, the page displays a note saying No action required. For
more information about the different types of update tasks and the guidance levels provided
by XenCenter, see Update tasks.
7. Click Install updates for XenCenter to begin installing updates for your host or pool.
8. The Install Updates wizard shows the progress of the update, displaying the major operations
that XenCenter performs while updating each host in the pool. Click Finish to complete the
updates and close the Install Updates wizard.
Update tasks
Some tasks (such as evacuating or rebooting your hosts) might be required before and after applying
updates to your pool. Sometimes, there are no update tasks required.
Guidance categories
XenServer tries to minimize the disruption to your VMs that these update tasks might cause by catego‑
rizing the tasks into Mandatory, Recommended, Full‑effectiveness, and Live patch. These catego‑
rizations enable you to judge whether an update task that might cause downtime or minor disruption
for your hosts or VMs is necessary for your environment and risk profile.
Updates can have tasks listed in more than one of these categories. For example, an update might
require that you restart the host to get the full‑effectiveness of the update, but recommend restarting
the toolstack to get most of the benefit of the update with less potential disruption to the pool.
During the update process, you can choose to carry out one of the following three levels of tasks:
1. Mandatory
2. Mandatory + Recommended
3. Mandatory + Recommended + Full‑effectiveness
Mandatory Mandatory tasks must be performed after an update otherwise the system might fail
at runtime. These actions are required to enable critical fixes and ensure that your environment is
secure and stable. When you apply updates, XenCenter performs these tasks. You cannot opt out of
mandatory tasks.
Recommended Recommended tasks are the tasks that we recommend you perform to get the ben‑
efit of the majority of features and fixes delivered in the updates. When you apply updates, these
tasks are selected by default in XenCenter, but you can opt out of performing them. If you choose not
to perform these tasks now, they are listed in the pending tasks for the applicable pool, host, or VM.
Why perform the recommended tasks:
• These tasks are the ones that ensure a secure, stable XenServer environment.
• After reviewing the detailed information for the updates, you judge that the risk of not fully ap‑
plying these updates now is acceptable.
• The recommended tasks cause unwanted disruption to your VMs now.
Full‑effectiveness Full effectiveness tasks are required to get the benefit of the related update. The
updates that have full‑effectiveness tasks associated with them are usually relevant only to users on
certain hardware or using specific features.
Review the update information to understand whether these tasks are required for your environment.
When you apply updates, these tasks are not selected by default in XenCenter, but you can choose
to perform them during the update if you believe the update applies to your environment or config‑
uration. If you choose not to perform these tasks now, they are listed in the pending tasks for the
applicable pool, host, or VM.
Why perform the full‑effectiveness tasks:
• The updates that have full‑effectiveness tasks are relevant to your hardware, environment, or
configuration.
• The updates that have full‑effectiveness guidance are not relevant to your hardware, environ‑
ment, or configuration.
• The full‑effectiveness tasks cause unwanted disruption to your VMs now.
• You do not need the benefits of these updates right now.
If the full‑effectiveness tasks apply to your environment, but you have opted to defer them, plan to
complete these tasks during a suitable maintenance window to maintain the stability of your environ‑
ment.
Live patches Updates to certain components can include a live patch. Whether a live patch can be
applied to your hosts depends on the version of the component that was installed when the hosts
were last rebooted. If an update can be applied as a live patch to your hosts, the live patch guidance
replaces the recommended guidance.
Example:
You have two pools. Pool A is updated to a recent level. Pool B has not been updated for some
time. We release a new update that has the recommended update task “Restart host”and the
live patch update task “Restart toolstack”.
In pool A, the live patch can be applied to these more up‑to‑date hosts. XenCenter recommended
guidance shows “Restart toolstack”. The less disruptive task from the live patch guidance over‑
rides the recommended guidance.
In pool B, the live patch cannot be applied to the hosts as they are at an older level. XenCenter
recommended guidance shows “Restart host”. The recommended guidance remains applicable.
The live patch guidance is irrelevant in this case.
Sometimes only some of the fixes in an update are enabled when the update is applied as a live patch.
Review the update details to understand whether you need all fixes in the update or just those fixes
enabled by the live patch. You can then use this information to choose whether to perform the recom‑
mended tasks. For more information, see View available updates for your pool.
Update tasks
One or more of the following tasks might be required when applying an update. Any type of update
task can be listed in any guidance category.
Update tasks for your host You only ever carry this task out before applying updates and you some‑
times carry it out as part of the ‘Reboot host’task:
• Evacuate server: All VMs must be migrated off the XenServer host or shutdown before applying
the update. To complete this task, XenCenter migrates any VMs off the host. While this task
is in progress, the XenServer pool is operating at reduced capacity as one host is temporarily
unavailable to run VMs.
• Reboot server: The XenServer host must be restarted. To complete this task, XenCenter mi‑
grates any VMs off the host and restarts the host. While this task is in progress, the XenServer
pool is operating at reduced capacity as one host is temporarily unavailable to run VMs.
• Restart toolstack: The toolstack on the host must be restarted. When XenCenter restarts the
toolstack on the pool coordinator, XenCenter loses connection to the pool and automatically
attempts to reconnect. On other pool members, there is no visible effect.
Update tasks for your VM Some updates provide new features for your VMs. These updates might
require the following tasks on your VMs:
• Reboot VM: The VM must be restarted. In XenCenter, while the VM is restarting it shows the red
stop icon (square on red). When the task is complete, it shows the green play icon. During this
time, the VM is unavailable to the end user.
• Restart device model: The device model for VMs on the updated host must be restarted. In
XenCenter, while the device model is restarting the VM shows a yellow warning triangle. When
the task is complete, it shows the green play icon. During this time you can’t stop, start, or
migrate the VM. The end user of the VM might see a slight pause and resume in their session.
For the restart device model action to be supported on a Windows VM, the VM must have the
XenServer VM Tools for Windows installed.
These tasks are listed on the XenServer 8 Updates tab in the Notifications view. For more information,
see View available updates for your pool.
If you choose not to perform all tasks during an update, the pending tasks for each pool, host, or VM
is shown in the XenCenter Infrastructure view.
In the General tab for the pool, host, or VM, see the Updates section.
This section shows the pending tasks for all hosts in the pool.
It also shows a checksum that indicates the level that the current pool coordinator has synchronized
to and checksums for each host that indicate the level of the updates installed. These checksums can
provide useful information if you need to contact Technical Support.
This section shows the pending tasks for the XenServer host.
It also shows a checksum that indicates the level of the updates installed. This checksum can provide
VM pending tasks
Apply updates to your XenServer 8 hosts and pools by using the xe CLI.
To receive updates, your XenServer hosts require internet access. If your hosts are behind a firewall,
ensure that they have access to subdomains of ops.xenserver.com. For more information, see
Connectivity requirements.
Before being able to apply updates to your XenServer hosts and pools, you must configure host up‑
dates by subscribing your pool or host to an update channel. These channels control how soon you
can access updates that are made available in the content delivery network (CDN).
After subscribing your pool to one of the update channels, your pool regularly and automatically syn‑
chronizes with the update channel. Alternatively, manually synchronize your pool with the update
channel. This synchronization action downloads all available updates to the pool coordinator. You
can then apply the downloaded updates by using the xe CLI.
1. Create and enable the Early Access update channel for your pool:
Alternatively, create and enable the Normal update channel for your pool:
10
11 xe pool-param-set uuid=<pool_uuid> repositories=<base_repo_uuid>,<
update_repo_uuid>
3. Using the repository UUID, view more details about a particular repository:
1 xe repository-param-list uuid=<UUID>
4. (Optional) Configure and enable an HTTP connect proxy server which is used for communication
between the host and the public CDN that hosts the repositories:
1 xe pool-configure-repository-proxy proxy-url=<http://proxy.example
.com> proxy-username=<proxy-user> proxy-password=<proxy-
password>
1 xe pool-disable-repository-proxy
Enable your pool to automatically synchronize with the update channel by configuring a synchroniza‑
tion schedule. You can schedule a synchronization to take place daily or weekly on a certain day of
the week. Synchronizing your pool with the update channel downloads all available updates to the
pool coordinator and you can then apply all of the downloaded updates to your pool.
3. Get the timestamp of your pool’s last successful synchronization with the update channel:
Alternatively, you can manually synchronize your XenServer pool with the update channel:
update_checksum is a unique identifier that indicates the level of the updates installed. It changes
whenever new updates are made available in the public CDN and is later used when applying updates
to your pool to ensure that you are always applying the latest available updates. update_checksum
can also provide useful information if you need to contact Technical Support.
Note:
After synchronizing, apply the updates to your pool as soon as possible to benefit from the latest
updates.
If you designate a new pool coordinator after synchronizing but before applying updates to the
hosts in the pool, you must synchronize again with the new pool coordinator before you can
update the pool.
Do not synchronize your XenServer pool while the pool is in the process of being updated.
Some tasks (such as evacuating or rebooting your hosts) might be required before and after applying
updates to your pool. Sometimes, there are no update tasks required.
Guidance categories
XenServer tries to minimize the disruption to your VMs that these tasks might cause by categorizing
the tasks into Mandatory, Recommended, Full‑effectiveness, and Live patch. These categoriza‑
tions enable you to judge whether an update task that might cause downtime or minor disruption for
your hosts or VMs is necessary for your environment and risk profile.
Updates can have tasks listed in more than one of these categories. For example, an update might
require that you restart the host to get the full‑effectiveness of the update, but recommend restarting
the toolstack to get most of the benefit of the update with less potential disruption to the pool.
During the update process, you can choose to carry out one of the following three levels of tasks:
1. Mandatory
2. Mandatory + Recommended
3. Mandatory + Recommended + Full‑effectiveness
Mandatory Mandatory tasks must be performed after an update otherwise the system might fail
at runtime. These actions are required to enable critical fixes and ensure that your environment is
secure and stable. You cannot opt out of mandatory tasks.
Recommended Recommended tasks are the tasks that we recommend you perform to get the ben‑
efit of the majority of features and fixes delivered in the updates. If you choose not to perform these
tasks now, they are listed in the pending update tasks for the applicable pool, host, or VM.
Why perform the recommended tasks:
• These tasks are the ones that ensure a secure, stable XenServer environment.
• After reviewing the detailed information for the updates, you judge that the risk of not fully ap‑
plying these updates now is acceptable.
• The recommended tasks cause unwanted disruption to your VMs now.
Full‑effectiveness Full effectiveness tasks are required to get the benefit of the related update. The
updates that have full‑effectiveness tasks associated with them are usually relevant only to users on
certain hardware or using specific features.
Review the update information to understand whether these tasks are required for your environment.
If you choose not to perform these tasks now, they are listed in the pending tasks for the applicable
pool, host, or VM.
Why perform the full‑effectiveness tasks:
• The updates that have full‑effectiveness tasks are relevant to your hardware, environment, or
configuration.
• The updates that have full‑effectiveness guidance are not relevant to your hardware, environ‑
ment, or configuration.
If the full‑effectiveness tasks apply to your environment, but you have opted to defer them, plan to
complete these tasks during a suitable maintenance window to maintain the stability of your environ‑
ment.
Live patches Updates to certain components can include a live patch. Whether a live patch can be
applied to your hosts depends on the version of the component that was installed when the hosts
were last rebooted. If an update can be applied as a live patch to your hosts, the live patch guidance
replaces the recommended guidance.
Example:
You have two pools. Pool A is updated to a recent level. Pool B has not been updated for some
time. We release a new update that has the recommended update task “Restart host”and the
live patch update task “Restart toolstack”.
In pool A, the live patch can be applied to these more up‑to‑date hosts. The recommended guid‑
ance shows “Restart toolstack”. The less disruptive task from the live patch guidance overrides
the recommended guidance.
In pool B, the live patch cannot be applied to the hosts as they are at an older level. The recom‑
mended guidance shows “Restart host”. The recommended guidance remains applicable. The
live patch guidance is irrelevant in this case.
Sometimes only some of the fixes in an update are enabled when the update is applied as a live patch.
Review the update details to understand whether you need all fixes in the update or just those fixes
enabled by the live patch. You can then use this information to choose whether to perform the recom‑
mended tasks. For more information, see View available updates for your pool.
Update tasks
One or more of the following tasks might be required when applying an update. Any type of update
task can be listed in any guidance category.
Update tasks for your host You only ever carry this task out before applying updates and you some‑
times carry it out as part of the ‘Reboot host’task:
View the update tasks required for your host View the tasks required for your host before and
after applying updates by using the following commands.
Update tasks for your VM Some updates provide new features for your VMs. These updates might
require the following tasks on your VMs:
View the update tasks required for your VM Get a list of the mandatory tasks for your VM:
Before installing updates, view the available updates for your pool and review the update tasks re‑
quired. For more information about the different update tasks that might be required for an update,
see Understand the guidance categories and update tasks.
This command returns yes if there are updates available for a particular host and no if there are none
available.
Check for available updates for all hosts by making a GET request on the HTTP endpoint /updates
.
1 HTTP GET
2 session_id: <XAPI session ID returned from login>
3 host_refs: <host XAPI reference>
The output returned is in JSON format and contains the following objects:
• hash: The update_checksum (used to ensure that you are always applying the latest avail‑
able updates).
The hosts and updates objects also contain the guidance object which consists of the following
keys:
• mandatory
• recommended
• full
• livepatch
These keys refer to the different guidance categories for update tasks. They list the update tasks re‑
quired for your hosts and VMs. For more information about the different tasks that might be required
for an update, see Understand the guidance categories and update tasks.
• Ensure that all the hosts in your pool are online before carrying out the pool update.
• Ensure that there are no pending mandatory update tasks on any host or VM. Any mandatory
update tasks pending from previous updates must be carried out before starting a new pool
update. For more information, see View the update tasks required for your host and View the
update tasks required for your VM.
Install updates
To perform an update to your pool, you must apply updates on every host in the pool, starting with
the pool coordinator first. Follow these steps, starting with the pool coordinator:
2. If one of the update tasks required for the update is ‘Evacuate host’or ‘Reboot host’, evacuate
the host:
If you can’t migrate a VM to other hosts during the host evacuation, shut down or suspend the
VM.
4. Get a list of the host update tasks required. For more information, see Update tasks for your
host.
Carry out the host’s update tasks in the list in the following order:
b) Reboot host
5. For every running VM on the host, get a list of the VM update tasks required. For more informa‑
tion, see Update tasks for your VM.
Carry out the VM’s update tasks in the list in the following order:
a) Restart device model (can be skipped if there is a ‘Restart VM’to be carried out)
b) Restart VM
7. For every VM which you migrated to another host using host-evacuate before the host up‑
date, get a list of the update tasks. For more information, see Update tasks for your VM.
If ‘Restart VM’is in the list of update tasks, shut down the VM and start it on the current updated
host. Otherwise, migrate the VM back to the current updated host.
8. Resume or start the VMs that you shut down or suspended before you applied updates.
After updating each host in your pool, carry out any remaining update tasks.
1. For every VM in your pool, get a list of the update tasks. For more information, see Update tasks
for your VM.
4. If you chose to carry out only the mandatory update tasks required for a pool update, the update
tasks that have not been carried out are appended to the list of pending update tasks required
for your hosts. To view this list and carry out these tasks, see Update tasks for your host.
September 3, 2024
XenServer provides features that enhances its interoperation with Citrix Virtual Apps and Desktops,
Citrix DaaS, and Citrix Provisioning.
Supported versions
You can find the versions of these products that XenServer 8 interoperates with on the Citrix website:
Supported Hypervisors for Citrix Virtual Apps and Desktops (MCS) and Citrix Provisioning (PVS).
Licensing
To use XenServer for your Citrix Virtual Apps and Desktops or Citrix DaaS workloads, you must have a
XenServer Premium Edition license. For more information, see Licensing.
XenServer is now an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid Multi‑Cloud,
Citrix Universal MSP, and Citrix Platform License subscriptions for running your Citrix workloads. Read
more.
You can find more information about XenServer licenses at the XenServer website.
The following XenServer features are designed for use with Citrix Virtual Apps and Desktops, Citrix
DaaS, and Citrix Provisioning:
• Intellicache: Using XenServer with IntelliCache makes hosted Citrix Virtual Desktop deploy‑
ments more cost‑effective by enabling you to use a combination of shared storage and local
storage. It is of particular benefit when many VMs all share a common OS image. The load on
the storage array is reduced and performance is enhanced. In addition, network traffic to and
from shared storage is reduced as the local storage caches the primary image from shared stor‑
age.
• Read caching: Read caching improves a VM’s disk performance by caching data within the host’
s free memory. It improves performance in a Citrix Virtual Desktops Machine Creation Services
(MCS) environment where many VMs are cloned off a single base VM, as it drastically reduces
the number of blocks read from disk.
• PVS‑Accelerator: The XenServer PVS‑Accelerator feature offers extended capabilities for cus‑
tomers using XenServer with Citrix Provisioning. PVS‑Accelerator provides many benefits in‑
cluding data locality, improved end‑user experience, accelerated VM boots and boot storms,
simplified scale‑out by adding more hypervisor hosts, and reduced TCO and simplified infra‑
structure requirements.
• Smooth roaming support for Virtual Desktop Tablet Mode: XenServer, in conjunction with
Citrix Virtual Apps and Desktops, enables you to experience Windows 10 Continuum experience
in a virtualized environment.
By using the XenCenter Import wizard, Citrix customers can easily migrate their VMs from VMware to
XenServer.
Learn more about moving from VMware to XenServer in our Tech Zone article: VMware to XenServer
migration guide.
As part of its software streaming technology, Citrix Provisioning stores a shared disk image (vDisk) as
a VHDX/AVHDX file.
VHDX is a virtual hard disk format that is used to store the disk data for VMs. It is an improved version
of the VHD format that provides better performance, fault tolerance, and data protection features in
addition to a larger capacity.
AVHDX (Automatic Virtual Hard Disk) is a disk image format that is part of the VHDX standard for virtual
hard disks. It is used to store the snapshot or checkpoint information of VMs. Whenever you create a
snapshot on a VM, an AVHDX file is automatically generated to preserve the current state of the virtual
hard disk. This file can be used to track the snapshot information of VMs. Each AVHDX file is linked to
the previous AVHDX file, creating a chain that contains all changes made since the base virtual hard
disk file.
By importing a VHDX/AVHDX file using the XenCenter Import wizard, you can migrate your vDisk
from VMware to XenServer. For information on how to use the XenCenter Import wizard to import a
VHDX/AVHDX file, see Import disk images.
Limitations You cannot import a VHDX/AVHDX file that is larger than 2 TB.
Best practices
When configuring and managing your XenServer environment there are steps you can take to optimize
how it works with Citrix products.
For in‑depth articles that describe reference architectures and deployments, see our TechZone.
• When first installing XenServer hosts, you can enable Intellicache to cache VM data locally and
improve performance. For more information, see Intellicache.
• If you are upgrading from an earlier version of Citrix Hypervisor or XenServer, the method you
use for this upgrade can depend on your Citrix Virtual Apps and Desktops workload. For more
information, see Upgrade scenarios for Citrix Virtual Apps and Desktops.
• The XenServer host comes installed with a default TLS certificate. However, to use HTTPS to
secure communication between XenServer and Citrix Virtual Apps and Desktops, install a cer‑
tificate provided by a trusted certificate authority. For more information, see Install a TLS cer‑
tificate on your host.
Memory usage
• When XenServer is first installed, it allocates a certain amount of memory to the control domain.
In many Citrix Virtual Apps and Desktops environments, it is advisable to increase the amount
of memory allocated to the control domain beyond this default.
For information about changing the amount of control domain memory and monitoring the
memory behavior, see Memory usage.
Upgrade scenarios for XenServer and Citrix Virtual Apps and Desktops
August 6, 2024
XenServer contains features and optimizations that make it an ideal hypervisor to use in your Citrix
Virtual Apps and Desktops environment.
If you are using XenServer with Citrix Virtual Apps and Desktops, there are some considerations when
performing your upgrade that are not covered in the main upgrade article: Upgrade from an existing
version. Review both this article and the main upgrade article before starting your upgrade from Citrix
Hypervisor 8.2 to XenServer 8.
Important:
If you use your Citrix Virtual Apps and Desktops license to license your Citrix Hypervisor 8.2 Cu‑
mulative Update 1 hosts, this license no longer applies to XenServer 8. You must instead get
XenServer Premium Edition licenses to cover every CPU socket in your pool. For more informa‑
tion about getting a XenServer license, see the XenServer website.
XenServer is now an entitlement of the Citrix for Private Cloud, Citrix Universal Hybrid Multi‑
Cloud, Citrix Universal MSP, and Citrix Platform License subscriptions for running your Citrix
workloads. Read more.
Considerations when upgrading XenServer in a Citrix Virtual Apps and Desktops environment:
• XenServer hosts restart twice as part of an upgrade. At the beginning of the upgrade, you must
boot your server into the installation media. At the end of the process, the installer restarts the
server to complete the upgrade. VMs on these hosts must be either migrated or stopped during
this time.
• The approach to use for upgrading XenServer depends on your XenServer environment, your
Citrix Virtual Apps and Desktops environment, and the types of machines and applications be‑
ing hosted by XenServer.
• You might be required to do some preparation in your Citrix Virtual Apps and Desktops environ‑
ment before starting your XenServer upgrade.
• This article only covers use cases where the Citrix Virtual Apps and Desktops workload is hosted
in the XenServer pool. Cases where you are also hosting parts of your Citrix Virtual Apps and
Desktops infrastructure on VMs in the XenServer pool are not covered by this article. Factor
these components in when doing your upgrade planning.
• Ensure that the version of Citrix Virtual Apps and Desktops you are using is supported for both
the version of XenServer you are upgrading from and the version you are upgrading to. For
more information, see Supported Hypervisors for Citrix Virtual Apps and Desktops (MCS) and
Citrix Provisioning (PVS).
• The time it takes to do the upgrade and the potential for service outage depends on your up‑
grade approach. The full upgrade of an entire pool might take multiple hours to complete.
• This article assumes that the time to fully upgrade a single XenServer host is 35 minutes. This
host upgrade time includes the upgrade process and any required restarts.
The approaches described in this article aim to guide you to an upgrade method that reduces the
possibility of service outage and enables the upgrade process to fit within your maintenance window.
However, in some cases, service outages are unavoidable. If the XenServer upgrade process cannot
fit within your maintenance window, you can run your pool in mixed mode for a short time between
maintenance windows. However, this is not recommended. For more information, see Mixed‑mode
pools.
During your planned XenServer upgrade maintenance window, follow these restrictions:
• Do not attempt to reconfigure the infrastructure of the pool that is being upgraded. For example,
do not add or eject hosts from the pool.
• Do not add, start, or stop any VMs in the pool that is being upgraded.
• Do not perform catalog updates during the window.
Rolling Pool Upgrade is a XenServer feature designed to make the upgrade process easier and to min‑
imize downtime.
The Rolling Pool Upgrade wizard in XenCenter guides you through the upgrade procedure and or‑
ganizes the upgrade path automatically. For pools, each of the servers in the pool is upgraded in
turn, starting with the pool coordinator. Before starting an upgrade, the wizard conducts a series
of prechecks. These prechecks ensure certain pool‑wide features, such as high availability, are tem‑
porarily disabled and that each server in the pool is prepared for upgrade. Only one server is offline
at a time. Any running VMs are automatically migrated off each server before the upgrade is installed
on that server.
You can use Rolling Pool Upgrade for many of the Citrix Virtual Apps and Desktops use cases outlined
in this article. For each, the upgrade time is the same: the number of hosts in the pool multiplied by
the upgrade time for a single host. (N x 35 minutes). The potential for VM outage depends on your
Citrix Virtual Apps and Desktops workload and XenServer pool setup.
Even if you intend to use Rolling Pool Upgrade to upgrade your XenServer pool, review the informa‑
tion for your specific environment to ensure that you understand the Citrix Virtual Apps and Desktops
prerequisite actions, any special considerations, and the behavior to expect.
Use cases
This article identifies several broad use cases. For each of these use cases, we assume that the
XenServer pool hosts only one type of Citrix Virtual Apps and Desktops workload. If your pool
contains a mix of different types of workload, review all the cases that apply to your pool to decide
what your preferred upgrade approach is.
In a XenServer pool with one or more shared storage repositories (SRs), the VM disks can be
hosted on this shared storage, which enables the VMs to migrate between hosts during the up‑
grade. This configuration can reduce or remove the need for VM downtime.
In a XenServer pool without shared storage or on a standalone XenServer host, the VMs can’t
migrate during the upgrade process. When the host reboots as part of the upgrade, you must
shut down the VMs.
If you are upgrading a pool where the VM disks are located on shared storage, you can evacuate VMs
from each XenServer host in the pool while it is upgraded.
Most use cases on this type of pool can be upgraded by using Rolling Pool Upgrade. However, the
prerequisite actions required in Citrix Virtual Apps and Desktops and the outage behavior is different
depending on your workload.
Consider what type of Citrix Virtual Apps and Desktops workload is hosted in your pool:
• Other workloads
If you are upgrading a pool where the VM disks are located on local storage or you have a single host
in your pool, the VMs cannot be migrated off the XenServer hosts while they are upgraded. In these
cases, the VMs must be shut down for the duration of the host or pool upgrade. Some outage to your
virtual apps and desktops is unavoidable in these cases.
Consider what type of Citrix Virtual Apps and Desktops workload is hosted in your pool:
• Assigned desktops
• Other workloads
This use case covers XenServer pools with shared storage whose primary workload is single‑session
virtual desktops with the random machine allocation type. Machines of this type must be managed
by either Citrix Provisioning or by Machine Creation Services.
For any workload that is managed by Citrix Virtual Apps and Desktops, including those that are power
managed by Citrix Provisioning and Machine Creation Services, you cannot maintain a complete work‑
load while the upgrade is being performed. Power management of machines can be problematic
during the upgrade process and you cannot disable power management without also disabling new
session creation.
– Estimated upgrade time: The number of hosts in the pool multiplied by the upgrade time
for a single host. (N x 35 minutes)
– Outage behavior: All machines are in Citrix Virtual Apps and Desktops maintenance mode
for the entire upgrade time.
If possible, make the workload available from other XenServer pools with capacity during the upgrade
of this pool. This approach might cause reduced capacity during the upgrade. If you do not have
capacity for the workload on your other XenServer hosts and pools, we recommend that you declare
an outage for all machines in your workload.
1. Put all the machines in the pool in maintenance mode. If all of the machines are using the same
connection, you can put the entire machine catalog in maintenance mode.
• If sessions are still running on the machines in this pool, ask users to log off or force their
sessions to end.
• Inform users that after they log off they can’t log in again until full service is resumed.
3. In XenCenter, start the Rolling Pool Upgrade wizard and choose automatic mode. For more
information, see Rolling Pool Upgrade by using XenCenter.
When the upgrade is complete, any VMs that were suspended as part of the Rolling Pool Upgrade
are restarted.
This use case covers XenServer pools with shared storage whose primary workload is either single‑
session virtual desktops with the assigned machine allocation type or multiple‑session virtual appli‑
cations with the random machine allocation type.
– Estimated upgrade time: The number of hosts in the pool multiplied by the upgrade time
for a single host. (N x 35 minutes)
– Outage behavior: No service outage
1. Ensure that the pool has enough capacity to run your workload with one fewer host in the pool.
During the upgrade process, each host is removed one at a time. The remaining hosts must be
able to run all required VMs.
If there is not enough capacity in the pool, some machines might not be available during the
upgrade process. If possible, you can suspend any non‑critical VMs during the upgrade process.
2. Ensure that all machines provided by the XenServer pool are powered on and are registered
with Citrix Virtual Apps and Desktops in the relevant Delivery Groups.
– Ensure that all machines are powered on (by using XenCenter, Citrix Studio, or Web
Studio).
– To enable new sessions to start during the upgrade process:
* Put the hosting connection in maintenance mode. For more information, see Turn
maintenance mode on or off for a connection.
* Inform end users that if they log off they cannot reconnect for the time of the up‑
grade.
– Follow the same guidance as for power‑managed machines in the preceding list item.
– In addition, do not attempt to create new machines during the entire upgrade period.
3. In XenCenter, start the Rolling Pool Upgrade wizard and choose automatic mode. For more
information, see Rolling Pool Upgrade by using XenCenter.
Case 3: Assigned desktops running on a pool with local storage or on a standalone host
This use case covers XenServer standalone hosts or pools that do not have shared storage whose pri‑
mary workload is either single‑session virtual desktops with the assigned machine allocation type.
• Rolling Pool Upgrade Use RPU in automatic mode in a single maintenance window. This re‑
quires all users to have outage for the entire upgrade, but has a lower administration overhead
for a pool
– Estimated upgrade time: The number of hosts in the pool multiplied by the upgrade time
for a single host. (N x 35 minutes)
– Outage behavior: All machines are in Citrix Virtual Apps and Desktops maintenance mode
for the entire upgrade time.
• Manual upgrade This mode provides the least outage for each user during the upgrade, but is
more involved for the administrator
– Estimated upgrade time: Two times the upgrade time for a single host. (Approximately
70 minutes)
– Outage behavior: Each desktop is unavailable during the upgrade time for their individual
host. This time is typically 35 minutes.
1. Put all delivery groups or catalogs that are providing machines from the pool into maintenance
mode.
While the machines are in maintenance mode, new sessions cannot be started on machines in
the pool. Existing sessions are maintained until the machines are shut down or suspended.
For more information, see Prevent users from connecting to a machine in a delivery group.
2. Notify all affected users of the impending outage. Provide a time by which they must end their
sessions and indicate when service will be restored.
3. Check for remaining sessions on impacted machines and take appropriate actions for these ses‑
sions.
4. In XenCenter, start the Rolling Pool Upgrade wizard and choose automatic mode. For more
information, see Rolling Pool Upgrade by using XenCenter.
When the upgrade is complete, any VMs that were suspended as part of the Rolling Pool Upgrade
are restarted.
You can use this manual process to upgrade the pool coordinator first then all other hosts in parallel
to reduce overall outage time significantly.
Note:
With the parallel upgrade approach, the risk profile changes. If there is an issue during the up‑
grade, it might not be detected until all hosts have been upgraded and are experiencing the issue.
Whereas if you upgrade your hosts sequentially, you can verify that the upgrade is successful on
each host before going on to the next.
1. Ensure that all machines provided by the XenServer pool or host are turned on and are regis‑
tered with Citrix Virtual Apps and Desktops in the relevant delivery groups.
* Put the hosting connection in maintenance mode. For more information, see Turn
maintenance mode on or off for a connection.
* Inform end users that if they log off they cannot reconnect for the time of the up‑
grade.
– Follow the same guidance as for power‑managed machines in the preceding list item.
– In addition, do not attempt to create machines during the entire upgrade period.
3. Put the machines in the catalog on the pool coordinator host into maintenance mode.
4. Use Director, Citrix Studio, or Web Studio to send messages to users that are still connected to
active sessions, warning them that their desktop is going offline for a period. This period is the
upgrade time for this individual host (approximately 35 minutes).
a) Disable the pool coordinator. This prevents any new VMs from starting on or being mi‑
grated to the specified host.
1 xe host-disable host=<uuid_or_name_label>
b) Ensure that no VMs are running on the pool coordinator. Shut down, suspend, or migrate
VMs to other hosts in the pool.
1 xe vm-shutdown
1 xe vm-suspend
1 xe vm-migrate
Migrating specified VMs to specified hosts gives you full control over the distribution
of migrated VMs to other hosts in the pool.
1 xe host-evacuate
Evacuating all VMs from a host leaves the distribution of migrated VMs to XenServer.
1 xe host-shutdown
Important:
You are unable to contact the pool coordinator until the upgrade of the pool coordi‑
nator is complete. Shutting down the pool coordinator causes the other hosts in the
pool to enter emergency mode. Hosts can enter emergency mode when they in a pool
whose pool coordinator has disappeared from the network and cannot be contacted
after several attempts. VMs continue to run on hosts in emergency mode, but control
operations are not available.
d) Boot the pool coordinator using the XenServer installation media and method of your
choice (such as, USB or network).
e) Follow the XenServer installation procedure until the installer offers you the option to up‑
grade. Choose to upgrade.
When your pool coordinator restarts, the other hosts in the pool leave emergency mode
and normal service is restored after a few minutes.
g) Migrate any VMs that you want back to the pool coordinator.
If anything interrupts the upgrade of the pool coordinator or if the upgrade fails for any rea‑
son, do not attempt to proceed with the upgrade. Reboot the pool coordinator and restore to a
working version.
6. After the pool coordinator is upgraded, take the machines on the pool coordinator out of main‑
tenance mode in Citrix Studio or Web Studio.
7. Complete the following steps in parallel for all remaining hosts in the pool:
a) Put the machines in the catalog on the host into maintenance mode.
b) Use Director, Citrix Studio, or Web Studio to send messages to users that are still connected
to active sessions, warning them that their desktop is going offline for a period. This period
is the upgrade time for this individual host (approximately 35 minutes).
1 xe host-disable host-selector=<host_selector_value>
d) Ensure that no VMs are running on the host. Shut down, suspend, or migrate VMs to other
hosts in the pool.
1 xe vm-shutdown
1 xe vm-suspend
1 xe vm-migrate
Migrating specified VMs to specified hosts gives you full control over the distribution
of migrated VMs to other hosts in the pool.
1 xe host-evacuate
Evacuating all VMs from a host leaves the distribution of migrated VMs to XenServer.
1 xe host-shutdown
f) Boot the host using the XenServer installation media and method of your choice (such as,
USB or network).
g) Follow the XenServer installation procedure until the installer offers you the option to up‑
grade. Choose to upgrade.
h) After the host upgrade is complete, start or resume any shutdown or suspended VMs.
If the upgrade of a subordinate host fails or is interrupted, you do not have to revert. Run the
command xe host-forget in the pool to forget that host. Reinstall XenServer on the host,
and then join it, as a new host, to the pool using the command xe pool-join.
8. After the XenServer hosts are updated, take the machines out of maintenance mode in Citrix
Studio or Web Studio.
Case 4: Other workloads running on a pool with local storage or on a standalone host
This use case covers XenServer pools with shared storage whose primary workload is single‑session
virtual desktops or multiple‑session virtual applications with the random machine allocation type.
For any workload that is managed by Citrix Virtual Apps and Desktops, including those that are power
managed by Citrix Provisioning and Machine Creation Services, you cannot maintain a complete work‑
load while the upgrade is being performed. Power management of machines can be problematic
during the upgrade process and you cannot disable power management without also disabling new
session creation.
– Estimated upgrade time: The number of hosts in the pool multiplied by the upgrade time
for a single host. (N x 35 minutes)
– Outage behavior: All machines are in Citrix Virtual Apps and Desktops maintenance mode
for the entire upgrade time.
• Manual upgrade
– Estimated upgrade time: Two times the upgrade time for a single host. (Approximately
70 minutes)
– Outage behavior: All machines are in Citrix Virtual Apps and Desktops maintenance mode
for the entire upgrade time.
If possible, make the workload available from other XenServer pools with capacity during the upgrade
of this pool. This approach might cause reduced capacity during the upgrade. If you do not have
capacity for the workload on your other XenServer hosts and pools, we recommend that you declare
an outage for all machines in your workload.
1. Put all the machines in the pool in maintenance mode. If all of the machines are using the same
connection, you can put the entire machine catalog in maintenance mode.
• If sessions are still running on the machines in this pool, ask users to log off or force their
sessions to end.
• Inform users that after they log off they can’t log in again until full service is resumed.
3. In XenCenter, start the Rolling Pool Upgrade wizard and choose automatic mode. For more
information, see Rolling Pool Upgrade by using XenCenter.
When the upgrade is complete, any VMs that were suspended as part of the Rolling Pool Upgrade
are restarted.
You can use this manual process to upgrade the pool coordinator first then all other hosts in parallel
to reduce overall outage time significantly.
Note:
With the parallel upgrade approach, the risk profile changes. If there is an issue during the up‑
grade, it might not be detected until all hosts have been upgraded and are experiencing the issue.
Whereas if you upgrade your hosts sequentially, you can verify that the upgrade is successful on
each host before going on to the next.
1. Ensure that all machines provided by the XenServer pool or host are turned on and are regis‑
tered with Citrix Virtual Apps and Desktops in the relevant delivery groups.
* Put the hosting connection in maintenance mode. For more information, see Turn
maintenance mode on or off for a connection.
* Inform end users that if they log off they cannot reconnect for the time of the up‑
grade.
– Follow the same guidance as for power‑managed machines in the preceding list item.
– In addition, do not attempt to create machines during the entire upgrade period.
3. Put the machines in the catalog on the pool coordinator host into maintenance mode.
4. Use Director, Citrix Studio, or Web Studio to send messages to users that are still connected to
active sessions, warning them that their desktop is going offline for a period. This period is the
upgrade time for this individual host (approximately 35 minutes).
a) Disable the pool coordinator. This prevents any new VMs from starting on or being mi‑
grated to the specified host.
1 xe host-disable host=<uuid_or_name_label>
b) Ensure that no VMs are running on the pool coordinator. Shut down, suspend, or migrate
VMs to other hosts in the pool.
1 xe vm-shutdown
1 xe vm-suspend
1 xe vm-migrate
Migrating specified VMs to specified hosts gives you full control over the distribution
of migrated VMs to other hosts in the pool.
1 xe host-evacuate
Evacuating all VMs from a host leaves the distribution of migrated VMs to XenServer.
1 xe host-shutdown
Important:
You are unable to contact the pool coordinator until the upgrade of the pool coordi‑
nator is complete. Shutting down the pool coordinator causes the other hosts in the
pool to enter emergency mode. Hosts can enter emergency mode when they in a pool
whose pool coordinator has disappeared from the network and cannot be contacted
after several attempts. VMs continue to run on hosts in emergency mode, but control
operations are not available.
d) Boot the pool coordinator using the XenServer installation media and method of your
choice (such as, USB or network).
e) Follow the XenServer installation procedure until the installer offers you the option to up‑
grade. Choose to upgrade.
When your pool coordinator restarts, the other hosts in the pool leave emergency mode
and normal service is restored after a few minutes.
g) Migrate any VMs that you want back to the pool coordinator.
If anything interrupts the upgrade of the pool coordinator or if the upgrade fails for any rea‑
son, do not attempt to proceed with the upgrade. Reboot the pool coordinator and restore to a
working version.
6. After the pool coordinator is upgraded, take the machines on the pool coordinator out of main‑
tenance mode in Citrix Studio or Web Studio.
7. Complete the following steps in parallel for all remaining hosts in the pool:
a) Put the machines in the catalog on the host into maintenance mode.
b) Use Director, Citrix Studio, or Web Studio to send messages to users that are still connected
to active sessions, warning them that their desktop is going offline for a period. This period
is the upgrade time for this individual host (approximately 35 minutes).
1 xe host-disable host-selector=<host_selector_value>
d) Ensure that no VMs are running on the host. Shut down, suspend, or migrate VMs to other
hosts in the pool.
1 xe vm-shutdown
1 xe vm-suspend
1 xe vm-migrate
Migrating specified VMs to specified hosts gives you full control over the distribution
of migrated VMs to other hosts in the pool.
1 xe host-evacuate
Evacuating all VMs from a host leaves the distribution of migrated VMs to XenServer.
1 xe host-shutdown
f) Boot the host using the XenServer installation media and method of your choice (such as,
USB or network).
g) Follow the XenServer installation procedure until the installer offers you the option to up‑
grade. Choose to upgrade.
h) After the host upgrade is complete, start or resume any shutdown or suspended VMs.
If the upgrade of a subordinate host fails or is interrupted, you do not have to revert. Run the
command xe host-forget in the pool to forget that host. Reinstall XenServer on the host,
and then join it, as a new host, to the pool using the command xe pool-join.
8. After the XenServer hosts are updated, take the machines out of maintenance mode in Citrix
Studio or Web Studio.
Mixed‑mode pools
A mixed‑mode pool is one where hosts in the pool are using different versions of XenServer. Do not
operate your pool in mixed‑mode (with multiple versions of XenServer) for longer than necessary, as
the pool operates in a degraded state during upgrade. In this degraded state, certain VM, SR, VDI, and
host operations are blocked. VMs that have run on a host at the higher version of XenServer cannot
be migrated to or started on a host at the lower version of XenServer.
Mixed‑mode pools are not supported for standard usage and are only supported as a transitional state
during the upgrade of a pool. If you experience an issue while running in mixed mode, Technical Sup‑
port will ask you to complete your pool upgrade and then reproduce the issue in a non‑mixed pool.
After reviewing the upgrade options for your Citrix Virtual Apps and Desktops environment, your
planned XenServer upgrade path might take longer than the available maintenance window. If possi‑
ble, extend the maintenance window to enable your XenServer upgrade to complete within it. If this
is not possible, you can choose to run the pool in mixed mode until your next maintenance window.
However, running your pool in mixed mode increases the likelihood of unexpected behaviors or
issues that might cause you to need an emergency maintenance window instead. Plan to minimize
the time your pool spends in mixed mode.
If your Citrix Virtual Apps and Desktops environment is running temporarily on top of a mixed‑mode
XenServer pool, be aware of the following behaviors:
• For Pooled Desktop workloads that require the VMs to restart before they are reused, the VMs
are restarted only on the hosts that are running the newer version of XenServer. The effective
capacity of the pool is restricted. Depending on how many of the hosts in your pool have been
upgraded, there might be insufficient capacity for all required VMs to be restarted. This behavior
can result in failures and some Citrix Virtual Apps and Desktops users might not be able to access
their required sessions.
• If you have dedicated machines using local storage that are located on hosts running the older
version of XenServer, these VMs can be stopped, but they cannot be restarted until the upgrade
is complete and the pool is no longer in mixed mode.
IntelliCache
February 7, 2024
Note:
This feature is only supported when using XenServer Premium Edition with Citrix Virtual Desk‑
tops.
Using XenServer with IntelliCache makes hosted Virtual Desktop Infrastructure deployments more
cost‑effective by enabling you to use a combination of shared storage and local storage. It is of partic‑
ular benefit when many Virtual Machines (VMs) all share a common OS image. The load on the storage
array is reduced and performance is enhanced. In addition, network traffic to and from shared storage
is reduced as the local storage caches the primary image from shared storage.
IntelliCache works by caching data from a VMs parent VDI in local storage on the VM host. This local
cache is then populated as data is read from the parent VDI. When many VMs share a common parent
VDI, a VM can use the data read into the cache from another VM. Further access to the primary image
on shared storage is not required.
A thin‑provisioned, local SR is required for IntelliCache. Thin provisioning is a way of optimizing the
use of available storage. This approach allows you to make more use of local storage instead of shared
storage. It relies on on‑demand allocation of blocks of data. In other approaches, all blocks are allo‑
cated up front.
Important:
Thin Provisioning changes the default local storage type of the host from LVM to EXT4. Thin Pro‑
visioning must be enabled in order for Citrix Virtual Desktops local caching to work properly.
Thin Provisioning allows the administrator to present more storage space to the VMs connecting to the
Storage Repository (SR) than is available on the SR. There are no space guarantees, and allocation of
a LUN does not claim any data blocks until the VM writes data.
Warning:
Thin‑provisioned SRs may run out of physical space, as the VMs within can grow to consume
disk capacity on demand. IntelliCache VMs handle this condition by automatically falling back
to shared storage when the local SR cache is full. Do not mix traditional virtual machines and
IntelliCache VMs on the same SR, as IntelliCache VMs can grow quickly in size.
IntelliCache deployment
IntelliCache must be enabled either during host installation or be enabled manually on a running host
using the CLI.
We recommend that you use a high performance local storage device to ensure the fastest possible
data transfer. For example, use a Solid State Disk or a high performance RAID array. Consider both
data throughput and storage capacity when sizing local disks. The shared storage type, used to host
the source Virtual Disk Image (VDI), must be NFS or EXT3/EXT4 based.
To enable IntelliCache during host installation, on the Virtual Machine Storage screen, select Enable
thin provisioning. This option selects the host’s local SR to be the one to be used for the local caching
of VM VDIs.
To delete an existing LVM local SR, and replace it with a thin‑provisioned EXT3/EXT4 SR, enter the
following commands.
Warning:
These commands remove your existing local SR, and VMs on the SR are permanently deleted.
6 xe pbd-destroy uuid=$pbd
7 xe sr-forget uuid=$localsr
8 sed -i "s/'lvm'/'ext'/" /etc/firstboot.d/data/default-storage.
conf
9 rm -f /var/lib/misc/ran-storage-init
10 systemctl restart storage-init.service
11 xe sr-list type=ext
1 xe host-disable host=hostname
2 localsr=`xe sr-list type=ext host=hostname params=uuid --
minimal`
3 xe host-enable-local-storage-caching host=hostname sr-uuid=
$localsr
4 xe host-enable host=hostname
The VDI flag on-boot dictates the behavior of a VM VDI when the VM is booted and the VDI flag allow
-caching dictates the caching behavior.
The values to use for these parameters depends on the type of VM you are creating and what its in‑
tended use is:
For example:
On VM boot, the VDI is reverted to the state it was in at the previous boot. All changes while the
VM is running are lost when the VM is next booted. New VM data is written only to local storage.
There are no writes to shared storage. This approach means that the load on shared storage is
reduced. However the VM cannot be migrated between hosts.
Select this option if you plan to deliver standardized desktops to which users cannot make per‑
manent changes.
For example:
On VM boot, the VDI is in the state it was left in at the last shutdown. New VM data is written to
both local and shared storage. Reads of cached data do not require I/O traffic to shared storage
so the load on shared storage is reduced. VM migration to another host is permitted and the
local cache on the new host is populated as data is read.
Select this option if you plan to allow users to make permanent changes to their desktops.
Note:
For VMs whose VDIs are located on a GFS2 SR, the VM on‑boot behavior is different to VMs with
VDIs on other types of SRs. For VDIs on a GFS2 SR, the on‑boot option is applied on VM shutdown,
not on VM boot.
Warning:
A VM cannot be migrated if any of its VDIs have caching behavior flags set to on-boot=reset
and allow-caching=true. Migration attempts for VMs with these properties fail.
1 xe sr-list params=local-cache-sr,uuid,name-label
• After host installation, if you have chosen “Enable thin provisioning”option in the host installer,
or
The first option uses the EXT3/EXT4 type local SR and is created during host installation. The second
option uses the SR that is specified on the command‑line.
Warning:
These steps are only necessary for users who have configured more than one local SR.
A: A VDI cache file is only deleted when the VDI itself is deleted. The cache is reset when a VDI is
attached to a VM (for example on VM start). If the host is offline when you delete the VDI, the SR syn‑
chronization that runs on startup garbage collects the cache file.
Note:
The cache file is not deleted from the host when a VM migrates to a different host or is shut down.
PVS‑Accelerator
The XenServer PVS‑Accelerator feature offers extended capabilities for customers using XenServer
with Citrix Provisioning. Citrix Provisioning is a popular choice for image management and hosting
for Citrix Virtual Apps and Desktops or Citrix DaaS. PVS‑Accelerator dramatically improves the already
excellent combination of XenServer and Citrix Provisioning. Some of the benefits that this new feature
provides include:
• Data locality: Use the performance and locality of memory, SSD, and NVM devices for read
requests, while substantially reducing network utilization.
• Improved end‑user experience: Data locality enables a reduction in the read I/O latency for
cached target devices (VMs), further accelerating end‑user applications.
• Accelerated VM boots and boot storms: Reduced read I/O‑latency and improved efficiency can
accelerate VM boot times and enable faster performance when many devices boot up within a
narrow time frame.
• Simplified scale‑out by adding more hypervisor hosts: Fewer Citrix Provisioning servers may
be needed as the storage load is efficiently dispersed across all XenServer hosts. Peak loads are
handled using the cache within originating hosts.
• Reduced TCO and simplified infrastructure requirements: Fewer Citrix Provisioning servers
means a reduction in hardware and license requirements, in addition to reduced management
overhead. Freed up capacity is available for workloads.
Notes:
PVS‑Accelerator is available for XenServer Premium Edition customers. To use the PVS‑
Accelerator feature, upgrade the Citrix License Server to version 11.14 or later.
To use PVS‑Accelerator with UEFI‑enabled VMs, ensure that you are using Citrix Provisioning 1906
or later.
PVS‑Accelerator employs a Proxy mechanism that resides in the Control Domain (dom0) of XenServer.
When this feature is enabled, Citrix Provisioning targets device (VM) read requests are cached directly
on the XenServer host machine. These requests are cached in physical memory or a storage reposi‑
tory. When subsequent VMs on that XenServer host make the same read request, the virtual disk is
streamed directly from cache, not from the Citrix Provisioning server. Removing the need to stream
from the Citrix Provisioning server reduces network utilization and processing on the server consider‑
ably. This approach results in a substantial improvement in VM performance.
Considerations
• Citrix Provisioning target devices are aware of their proxy status. No additional configuration is
required once the capability is installed.
• In environments where multiple Citrix Provisioning servers are deployed with the same VHD,
but have different file system timestamps, data might be cached multiple times. Due to this
limitation, we recommend using VHDX format, rather than VHD for virtual disks.
• Do not use a large port range for PVS server communication. Setting a range of more than 20
ports on the PVS server is rarely necessary. A large port range can slow packet processing and
increase the boot time of VMs when using PVS‑Accelerator.
• After you start a VM with PVS‑Accelerator enabled, the caching status for the VM is displayed in
XenCenter:
• You cannot run more than 200 PVS‑Accelerator‑enabled VMs on a XenServer host.
• Customers can confirm the correct operation of the PVS‑Accelerator using RRD metrics on the
host’s Performance tab in XenCenter. For more information, see Monitor and manage your
deployment.
• PVS‑Accelerator requires Citrix Provisioning 7.13 or later.
• To use PVS‑Accelerator with UEFI‑enabled VMs, ensure that you are using Citrix Provisioning
1906 or later.
• PVS‑Accelerator is available for XenServer Premium Edition customers.
• PVS‑Accelerator requires License Server 11.14 or later.
• PVS‑Accelerator uses capabilities of OVS and is therefore not available on hosts that use Linux
Bridge as the network back‑end.
• PVS‑Accelerator works on the first virtual network interface (VIF) of a cached VM. Therefore, con‑
nect the first VIF to the Citrix Provisioning storage network for caching to work.
• PVS‑Accelerator can currently not be used on network ports which enforce that IPs are bound
to certain MAC addresses. This switch functionality might be called “IP Source Guard”or similar.
In such environments, PVS targets fail to boot with error ‘Login request time out!’after enabling
PVS‑Accelerator.
Enable PVS‑Accelerator
Customers must complete the following configuration settings in XenServer and in Citrix Provisioning
to enable the PVS‑Accelerator feature:
1. Configure PVS‑Accelerator in XenServer by using XenCenter or the xe CLI. This configuration in‑
cludes adding a Citrix Provisioning site and specifying the location for Citrix Provisioning cache
storage.
• For CLI instructions, see Configuring PVS‑Accelerator in XenServer by using the CLI in the
following section.
• For information about configuring PVS‑Accelerator using XenCenter, see PVS‑Accelerator
in the XenCenter documentation.
2. After configuring PVS‑Accelerator in XenServer, complete the cache configuration for the PVS
Site using the PVS UI. For detailed instructions, see Completing the cache configuration in Citrix
Provisioning.
Configuring ports
• 6901, 6902, 6905: Used for provisioning server outbound communication (packets destined for
the target device)
• 6910: Used for target device logon with Citrix Provisioning Services
• Configurable target device port. The default port is 6901.
• Configurable server port range. The default range is 6910‑6930.
For information about the ports used by Citrix Provisioning Services, see Communication ports used
by XenServer.
The configured port range in XenServer must include all the ports in use. For example, use 6901‑6930
for the default configuration.
Note:
Do not use a large port range for PVS server communication. Setting a range of more than 20
ports on the PVS server is rarely necessary. A large port range can slow packet processing and
increase the boot time of VMs when using PVS‑Accelerator.
1. Run the following command to create a Citrix Provisioning site configuration on XenServer:
2. For each host in the pool, specify what cache to use. You can choose to store the cache on a
storage repository (SR) or in the Control Domain Memory.
Configure cache storage on a storage repository Consider the following characteristics when
choosing a storage repository (SR) for cache storage:
Advantages:
• Most recently read data is cached in the memory on a best effort basis. Accessing the data can
be as fast as using the Control Domain memory.
• The cache can be much larger when it is on an SR. The cost of the SR space is typically a fraction
of the cost of the memory space. Caching on an SR can take more load off the Citrix Provisioning
server.
• You don’t have to modify the Control Domain memory setting. The cache automatically uses
the memory available in the Control Domain and never causes the Control Domain to run out
of memory.
• The cache VDIs can be stored on shared storage. However, this choice of storage rarely makes
sense. This approach only makes sense where the shared storage is significantly faster than the
Citrix Provisioning server.
Disadvantages:
• If the SR is slow and the requested data isn’t in the memory tier, the caching process can be
slower than a remote Citrix Provisioning server.
• Cached VDIs that are stored on shared storage cannot be shared between hosts. A cached VDI
is specific to one host.
1. Run the following command to find the UUID of the SR that to use for caching:
Note:
When selecting a Storage Repository (SR), the feature uses up to the specified cache size
on the SR. It also implicitly uses available Control Domain memory as a best effort cache
tier.
Configuring cache storage in the control domain memory Consider the following characteristics
when choosing the Control Domain memory for cache storage:
Advantages:
Using memory means consistently fast Read/Write performance when accessing or populating the
cache.
Disadvantages:
• Hardware must be sized appropriately as the RAM used for cache storage is not available for
VMs.
• Control Domain memory must be extended before configuring cache storage.
Note:
If you choose to store the cache in the Control Domain memory, the feature uses up to
the specified cache size in Control Domain memory. This option is only available after ex‑
tra memory has been assigned to the Control Domain. For information about increasing
the Control Domain memory, see Change the amount of memory allocated to the control
domain.
After you increase the amount of memory allocated to the Control Domain of the host, the ad‑
ditional memory can be explicitly assigned for PVS‑Accelerator.
Perform the following steps to configure cache storage in the Control Domain memory:
1. Run the following command to find the UUID of the host to configure for caching:
Note:
For SRs of the special type tmpfs, the value of the required parameter name-label
is disregarded and a fixed name is used instead.
1 xe pvs-cache-storage-create host-uuid=HOST_UUID
2 pvs-site-uuid=PVS_SITE_UUID sr-uuid=SR_UUID size=1GiB
After configuring PVS‑Accelerator in XenServer, perform the following steps to complete the cache
configuration for the Citrix Provisioning site.
In the Citrix Provisioning Administrator Console, use the Citrix Virtual Desktops Setup Wizard or the
Streaming VM Wizard (depending on your deployment type) to access the Proxy capability. Although
both wizards are similar and share many of the same screens, the following differences exist:
• The Citrix Virtual Desktops Setup Wizard is used to configure VMs running on XenServer hy‑
pervisor that is controlled using Citrix Virtual Desktops.
• The Streaming VM Wizard is used to create VMs on a host. It does not involve Citrix Virtual
Desktops.
3. Choose the appropriate wizard based on the deployment. Select the option Enable PVS‑
Accelerator for all Virtual Machines to enable the PVS‑Accelerator feature.
4. If you are enabling virtual disk caching for the first time, the XenServer screen appears on the
Streamed Virtual Machine Setup wizard. It displays the list of all Citrix Provisioning sites config‑
ured on XenServer that have not yet been associated with a Citrix Provisioning site. Using the
list, select a Citrix Provisioning site to apply PVS‑Accelerator. This screen is not displayed when
you run the wizard for the same Citrix Provisioning site using the same XenServer host.
6. Click Finish to provision Citrix Virtual Desktops or Streamed VMs and associate the selected Cit‑
rix Provisioning site with the PVS Accelerator in XenServer. When this step is complete, the View
PVS Servers button in the PVS‑Accelerator configuration window is enabled in XenCenter.
Clicking the View PVS Servers button displays the IP addresses of all PVS Servers associated
with the Citrix Provisioning site.
Caching operation
• Reads from virtual disks but not writes or reads from a write cache
• Based on image versions. Multiple VMs share cached blocks when they use the same image
version
• Virtual disks with the access mode Standard Image. It does not work for virtual disks with the
access mode Private Image
• Devices that are marked as type Production or Test. Devices marked as type Maintenance are
not cached
The following section describes the operations that customers can perform when using PVS‑
Accelerator using the CLI. Customers can also perform these operations using XenCenter. For more
information, see PVS‑Accelerator in the XenCenter documentation.
View Citrix Provisioning server addresses and ports configured by Citrix Provisioning
PVS‑Accelerator works by optimizing the network traffic between a VM and the Citrix Provisioning
server. When completing the configuration on the Citrix Provisioning server, the Citrix Provisioning
server populates the pvs-server objects on XenServer with their IPs and ports. PVS‑Accelerator
later uses this information to optimize specifically the traffic between a VM and its Citrix Provisioning
servers. The configured Citrix Provisioning servers can be listed using the following command:
PVS‑Accelerator can be enabled for the VM by using any of the following tools:
The xe CLI configures PVS‑Accelerator by using the VIF of a VM. It creates a Citrix Provisioning proxy
that links the VM’s VIF with a Citrix Provisioning site.
To configure a VM:
PVS‑Accelerator can be disabled for a VM by destroying the Citrix Provisioning proxy that links the VM’
s VIF with a pvs-site.
1 xe pvs-proxy-destroy uuid=$PVS_PROXY_UUID
1. Find the host for which you would like to destroy the storage:
1 xe pvs-cache-storage-destroy uuid=$PVS_CACHE_STORAGE_UUID
1 xe pvs-site-forget uuid=$PVS_SITE_UUID
This section describes how resource pools can be created through a series of examples using the xe
command line interface (CLI). A simple NFS‑based shared storage configuration is presented and sev‑
eral simple VM management examples are discussed. It also contains procedures for dealing with
physical node failures.
A resource pool comprises multiple XenServer host installations, bound together to a single managed
entity which can host Virtual Machines. If combined with shared storage, a resource pool enables VMs
to be started on any XenServer host which has sufficient memory. The VMs can then be dynamically
moved among XenServer hosts while running with a minimal downtime (live migration). If an indi‑
vidual XenServer host suffers a hardware failure, the administrator can restart failed VMs on another
XenServer host in the same resource pool. When high availability is enabled on the resource pool, VMs
automatically move to another host when their host fails. Up to 64 hosts are supported per resource
pool, although this restriction is not enforced.
A pool always has at least one physical node, known as the pool coordinator (formerly “pool master”
). The coordinator node exposes an administration interface (used by XenCenter and the XenServer
command line interface, known as the xe CLI). The coordinator forwards commands to individual
members as necessary.
Note:
When the pool coordinator fails, coordinator re‑election takes place only if high availability is
enabled.
A resource pool is a homogeneous (or heterogeneous with restrictions) aggregate of one or more
XenServer hosts, up to a maximum of 64. The definition of homogeneous is:
• CPUs on the host joining the pool are the same (in terms of the vendor, model, and features) as
the CPUs on hosts already in the pool.
• The host joining the pool is running the same version of XenServer software, at the same patch
level, as the hosts already in the pool.
The software enforces extra constraints when joining a host to a pool. In particular, XenServer checks
that the following conditions are true for the host joining the pool:
• No active operations are in progress on the VMs on the host, such as a VM shutting down.
• The clock on the host is synchronized to the same time as the pool coordinator (for example, by
using NTP).
• The management interface of the host is not bonded. You can configure the management inter‑
face when the host successfully joins the pool.
• The management IP address is static, either configured on the host itself or by using an appro‑
priate configuration on your DHCP server.
XenServer hosts in resource pools can contain different numbers of physical network interfaces and
have local storage repositories of varying size. In practice, it is often difficult to obtain multiple hosts
with the exact same CPUs, and so minor variations are permitted. If it is acceptable to have hosts
with varying CPUs as part of the same pool, you can force the pool‑joining operation by passing the
--force parameter.
All hosts in the pool must be in the same site and connected by a low latency network.
Note:
Servers providing shared NFS or iSCSI storage for the pool must have a static IP address.
A pool must contain shared storage repositories to select on which XenServer host to run a VM and
to move a VM between XenServer hosts dynamically. If possible create a pool after shared storage is
available. We recommend that you move existing VMs with disks located in local storage to shared
storage after adding shared storage. You can use the xe vm-copy command or use XenCenter to
move VMs.
Resource pools can be created using XenCenter or the CLI. When a new host joins a resource pool, the
joining host synchronizes its local database with the pool‑wide one, and inherits some settings from
the pool:
• VM, local, and remote storage configuration is added to the pool‑wide database. This configu‑
ration is applied to the joining host in the pool unless you explicitly make the resources shared
after the host joins the pool.
• The joining host inherits existing shared storage repositories in the pool. Appropriate PBD
records are created so that the new host can access existing shared storage automatically.
• Networking information is partially inherited to the joining host: the structural details of NICs,
VLANs, and bonded interfaces are all inherited, but policy information is not. This policy infor‑
mation, which must be reconfigured, includes:
– The IP addresses of the management NICs, which are preserved from the original configu‑
ration.
– The location of the management interface, which remains the same as the original config‑
uration. For example, if the other pool hosts have management interfaces on a bonded
interface, the joining host must be migrated to the bond after joining.
– Dedicated storage NICs, which must be reassigned to the joining host from XenCenter or
the CLI, and the PBDs replugged to route the traffic accordingly. This is because IP ad‑
dresses are not assigned as part of the pool join operation, and the storage NIC works only
when this is correctly configured. For more information on how to dedicate a storage NIC
from the CLI, see Manage networking.
Note:
You can only join a new host to a resource pool when the host’s management interface is on the
same tagged VLAN as that of the resource pool.
Note:
We recommend to update your pool and the joining host to the same level before attempting the
join.
1. Open a console on the XenServer host that you want to join to a pool.
The master-address must be set to the fully qualified domain name of the pool coordina‑
tor. The password must be the administrator password set when the pool coordinator was
installed.
Note:
When you join a host to a pool, the administrator password for the joining host is automatically
changed to match the administrator password of the pool coordinator.
XenServer hosts belong to an unnamed pool by default. To create your first resource pool, rename
the existing nameless pool. Use tab‑complete to find the pool_uuid:
XenServer simplifies expanding deployments over time by allowing disparate host hardware to be
joined in to a resource pool, known as heterogeneous resource pools. Heterogeneous resource pools
are made possible by using technologies in Intel (FlexMigration) and AMD (Extended Migration) CPUs
that provide CPU “masking”or “leveling”. The CPU masking and leveling features allow a CPU to be
configured to appear as providing a different make, model, or functionality than it actually does. This
feature enables you to create pools of hosts with disparate CPUs but still safely support live migra‑
tion.
Note:
The CPUs of XenServer hosts joining heterogeneous pools must be of the same vendor (that is,
AMD, Intel) as the CPUs of the hosts already in the pool. However, the hosts are not required to
be the same type at the level of family, model, or stepping numbers.
XenServer simplifies the support of heterogeneous pools. Hosts can now be added to existing re‑
source pools, irrespective of the underlying CPU type (as long as the CPU is from the same vendor
family). The pool feature set is dynamically calculated every time:
Any change in the pool feature set does not affect VMs that are currently running in the pool. A Running
VM continues to use the feature set which was applied when it was started. This feature set is fixed at
boot and persists across migrate, suspend, and resume operations. If the pool level drops when a less‑
capable host joins the pool, a running VM can be migrated to any host in the pool, except the newly
added host. When you move or migrate a VM to a different host within or across pools, XenServer
compares the VM’s feature set against the feature set of the destination host. If the feature sets are
found to be compatible, the VM is allowed to migrate. This enables the VM to move freely within and
across pools, regardless of the CPU features the VM is using. If you use Workload Balancing to select
an optimal destination host to migrate your VM, a host with an incompatible feature set will not be
recommended as the destination host.
For a complete list of supported shared storage types, see Storage repository formats. This section
shows how shared storage (represented as a storage repository) can be created on an existing NFS
server.
1 xe pool-list
4. Set the shared storage as the pool‑wide default with the following command:
As the shared storage has been set as the pool‑wide default, all future VMs have their disks cre‑
ated on shared storage by default. For information about creating other types of shared storage,
see Storage repository formats.
Before removing any XenServer host from a pool, ensure that you shut down all the VMs running
on that host. Otherwise, you can see a warning stating that the host cannot be removed.
When you remove (eject) a host from a pool, the machine is rebooted, reinitialized, and left in a state
similar to a fresh installation. Do not eject XenServer hosts from a pool if there is important data on
the local disks.
1 xe host-list
1 xe pool-eject host-uuid=host_uuid
Warning:
Do not eject a host from a resource pool if it contains important data stored on its local
disks. All of the data is erased when a host is ejected from the pool. If you want to preserve
this data, copy the VM to shared storage on the pool using XenCenter, or the xe vm-copy
CLI command.
When XenServer hosts containing locally stored VMs are ejected from a pool, the VMs will be present in
the pool database. The locally stored VMs are also visible to the other XenServer hosts. The VMs do not
start until the virtual disks associated with them have been changed to point at shared storage seen
by other XenServer hosts in the pool, or removed. Therefore, we recommend that you move any local
storage to shared storage when joining a pool. Moving to shared storage allows individual XenServer
hosts to be ejected (or physically fail) without loss of data.
Note:
When a host is removed from a pool that has its management interface on a tagged VLAN network,
the machine is rebooted and its management interface will be available on the same network.
Before performing maintenance operations on a host that is part of a resource pool, you must disable
it. Disabling the host prevents any VMs from being started on it. You must then migrate its VMs to
another XenServer host in the pool. You can do this by placing the XenServer host in to Maintenance
mode using XenCenter. For more information, see Run in maintenance mode in the XenCenter docu‑
mentation.
Backup synchronization occurs every 24 hrs. Placing the pool coordinator in to maintenance mode
results in the loss of the last 24 hrs of RRD updates for offline VMs.
Warning:
We highly recommend rebooting all XenServer hosts before installing an update and then verify‑
ing their configuration. Some configuration changes only take effect when the XenServer host is
rebooted, so the reboot may uncover configuration problems that can cause the update to fail.
1 xe host-disable uuid=XenServer_host_uuid
2 xe host-evacuate uuid=XenServer_host_uuid
This command disables the XenServer host and then migrates any running VMs to other
XenServer hosts in the pool.
1 xe host-enable
The Export Resource Data option allows you to generate a resource data report for your pool and ex‑
port the report into an .xls or .csv file. This report provides detailed information about various re‑
sources in the pool such as hosts, networks, storage, virtual machines, VDIs, and GPUs. This feature
enables administrators to track, plan, and assign resources based on various workloads such as CPU,
storage, and network.
Note:
Export Resource Pool Data is available for XenServer Premium Edition customers.
The list of resources and various types of resource data that are included in the report:
Server:
• Name
• Pool Coordinator
• UUID
• Address
• CPU Usage
• Network (avg/max KBs)
• Used Memory
• Storage
• Uptime
• Description
Networks:
• Name
• Link Status
• MAC
• MTU
• VLAN
• Type
• Location
VDI:
• Name
• Type
• UUID
• Size
• Storage
• Description
Storage:
• Name
• Type
• UUID
• Size
• Location
• Description
VMs:
• Name
• Power State
• Running on
• Address
• MAC
• NIC
• Operating System
• Storage
• Used Memory
• CPU Usage
• UUID
• Uptime
• Template
• Description
GPU:
• Name
• Servers
• PCI Bus Path
• UUID
• Power Usage
• Temperature
• Used Memory
• Computer Utilization
Note:
Information about GPUs is available only if there are GPUs attached to your XenServer host.
1. In the XenCenter Navigation pane, select Infrastructure and then select the pool.
3. Browse to a location where you would like to save the report and then click Save.
Host power‑on
You can use the XenServer host Power On feature to turn a host on and off remotely, either from Xen‑
Center or by using the CLI.
To enable host power, the host must have one of the following power‑control solutions:
• A custom script based on the management API that enables you to turn the power on and off
through XenServer. For more information, see Configuring a custom script for the Host Power On
feature in the following section.
1. Ensure the hosts in the pool support controlling the power remotely. For example, they have
Wake on LAN functionality or support IPMI, or you have created a custom script.
You can manage the Host Power On feature using either the CLI or XenCenter. This section provides
information about managing it with the CLI.
Host Power On is enabled at the host level (that is, on each XenServer).
After you enable Host Power On, you can turn on hosts using either the CLI or XenCenter.
If your host’s remote‑power solution uses a protocol that is not supported by default (such as Wake‑
On‑Ring or Intel Active Management Technology), you can create a custom Linux Python script to turn
on your XenServer computers remotely. However, you can also create custom scripts for IPMI and
Wake on LAN remote‑power solutions.
This section provides information about configuring a custom script for Host Power On using the key/‑
value pairs associated with the XenServer API call host.power_on.
When you create a custom script, run it from the command line each time you want to control power
remotely on a XenServer host. Alternatively, you can specify it in XenCenter and use the XenCenter UI
features to interact with it.
Warning:
Do not change the scripts provided by default in the /etc/xapi.d/plugins/ directory. You
can include new scripts in this directory, but you must never change the scripts contained in that
directory after installation.
Key/Value Pairs To use Host Power On, configure the host.power_on_mode and host.
power_on_config keys. See the following section for information about the values.
There is also an API call that lets you set these fields simultaneously:
host.power_on_mode
• Possible values:
• Type: string
host.power_on_config
• Definition: Contains key/value pairs for mode configuration. Provides additional information
for IPMI.
• Possible values:
– If you configured IPMI as the type of remote‑power solution, you must also specify one of
the following keys:
* “power_on_user”: The IPMI user name associated with the management processor,
which you might have changed from its factory default settings.
Sample script The sample script imports the XenServer API, defines itself as a custom script, and
then passes parameters specific to the host you want to control remotely. You must define the para‑
meters session in all custom scripts.
The result appears when the script is unsuccessful.
1 import XenAPI
2 def custom(session,remote_host,
3 power_on_config):
4 result="Power On Not Successful"
5 for key in power_on_config.keys():
6 result=result+''
7 key=''+key+''
8 value=''+power_on_config[key]
9 return result
Note:
TLS
XenServer uses the TLS 1.2 protocol to encrypt management API traffic. Any communication between
XenServer and management API clients (or appliances) uses the TLS 1.2 protocol.
Important:
• TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
In addition, the following cipher suites are also supported for backwards compatibility with some
versions of Citrix Virtual Apps and Desktops:
• TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
• TLS_RSA_WITH_AES_256_CBC_SHA256
• TLS_RSA_WITH_AES_128_CBC_SHA256
SSH
When using an SSH client to connect directly to the XenServer host the following algorithms can be
used:
Ciphers:
• aes128‑ctr
• aes256‑ctr
• aes128‑[email protected]
• aes256‑[email protected]
MACs:
• hmac‑sha2‑256
• hmac‑sha2‑512
• hmac‑sha1
KexAlgorithms:
• curve25519‑sha256
• ecdh‑sha2‑nistp256
• ecdh‑sha2‑nistp384
• ecdh‑sha2‑nistp521
• diffie‑hellman‑group14‑sha1
HostKeyAlgorithms:
• ecdsa‑sha2‑nistp256
• ecdsa‑sha2‑nistp384
• ecdsa‑sha2‑nistp521
• ssh‑ed25519
• ssh‑rsa
If you want to disable SSH access to your XenServer host, you can do this in xsconsole.
2. Type xsconsole.
Important:
The XenServer host comes installed with a default TLS certificate. However, to use HTTPS to secure
communication between XenServer and Citrix Virtual Apps and Desktops, install a certificate provided
by a trusted certificate authority.
This section describes how to install certificates by using the xe CLI. For information about working
with certificates by using XenCenter, see the XenCenter documentation.
Ensure that your TLS certificate and its key meet the following requirements:
• Any certificate files must be one of the following types: .pem, .cer, or .crt.
• The key is greater than or equal to 2048 bits and less than or equal to 4096 bits in length.
• The key is an unencrypted PKCS #8 key and does not have a passkey.
• The key and certificate are in base‑64 encoded ‘PEM’format.
• The certificate is valid and has not expired.
• The signature algorithm is SHA‑2 (SHA256).
The xe CLI warns you when the certificate and key you choose do not meet these requirements.
• You might already have a trusted certificate that you want to install on your XenServer host.
• Alternatively, you can create a certificate on your server and send it to your preferred certifi‑
cate authority to be signed. This method is more secure as the private key can remain on the
XenServer host and not be copied between systems.
1. Generate a certificate signing request First, generate a private key and certificate signing re‑
quest. On the XenServer host, complete the following steps:
You are prompted for a pass phrase. This pass phrase is removed in a following step.
4. Follow the prompts to provide the information necessary to generate the certificate signing re‑
quest.
• Country Name. Enter the TLS Certificate country codes for your country. For example, CA
for Canada or JM for Jamaica. You can find a list of TLS Certificate country codes on the
web.
• State or Province Name (full name). Enter the state or province where the pool is located.
For example, Massachusetts or Alberta.
• Locality Name. The name of the city where the pool is located.
• Organization Name. The name of your company or organization.
• Organizational Unit Name. Enter the department name. This field is optional.
• Common Name. Enter the FQDN of your XenServer host. We recommend specifying either
an FQDN or an IP address that does not expire.
• Email Address. This email address is included in the certificate when you generate it.
The certificate signing request is saved in the current directory and is named csr.
5. Display the certificate signing request in the console window by running the following com‑
mand:
1 cat csr
6. Copy the entire certificate signing request and use this information to request the certificate
from the certificate authority.
2. Send the certificate signing request to a certificate authority Now that you have generated
the certificate signing request, you can submit the request to your organization’s preferred certificate
authority.
A certificate authority is a trusted third‑party that provides digital certificates. Some certificate au‑
thorities require the certificates to be hosted on a system that is accessible from the internet. We
recommend not using a certificate authority with this requirement.
The certificate authority responds to your signing request and provides the following files:
You can now install all these files on your XenServer host.
3. Install the signed certificate on your XenServer host After the certificate authority reponds to
the certificate signing request, complete the following steps to install the certificate on your XenServer
host:
1. Get the signed certificate and, if the certificate authority has one, the intermediate certificate
from the certificate authority.
1 xe host-server-certificate-install certificate=<
path_to_certificate_file> private-key=<path_to_private_key>
certificate-chain=<path_to_chain_file>
For additional security, you can delete the private key file after the certificate is installed.
When you first install a XenServer host, you set an administrator or root password. You use this pass‑
word to connect XenCenter to your host or (with user name root) to log into xsconsole, the system
configuration console.
If you join a host to a pool, the administrator password for the host is automatically changed to match
the administrator password of the pool coordinator.
Note:
You can use XenCenter, the xe CLI, or xsconsole to change the administrator password.
XenCenter To change the administrator password for a pool or standalone host by using XenCenter,
complete the following steps:
1. In the Resources pane, select the pool or any host in the pool.
2. On the Pool menu or on the Server menu, select Change Server Password.
To change the root password of a standalone host, select the host in the Resources pane, and click
Password and then Change from the Server menu.
If XenCenter is configured to save your host login credentials between sessions, the new password is
remembered. For more information, see Store your host connection state.
After changing the administrator password, rotate the pool secret. For more information, see Rotate
the pool secret.
xe CLI To change the administrator password by using the xe CLI, run the following command on a
host in the pool:
1 xe user-password-change new=<new_password>
Note:
Ensure that you prefix the command with a space to avoid storing the plaintext password in the
command history.
After changing the administrator password, rotate the pool secret. For more information, see Rotate
the pool secret.
xsconsole To change the administrator password for a pool or a standalone host by using xscon‑
sole, complete the following steps:
2. Log in as root.
4. In xsconsole, use the arrow keys to navigate to the Authentication option. Press Enter.
If the host is pool coordinator, this updated password is now propagated to the other hosts in the
pool.
After changing the administrator password, rotate the pool secret. For more information, see Rotate
the pool secret.
If you lose the administrator (root) password for your XenServer host, you can reset the password by
accessing the host directly.
2. When the GRUB menu shows, press e to edit the boot menu entry.
1 chroot /sysroot
2 passwd
3
4 (type the new password twice)
5
6 sync
7 /sbin/reboot -f
If the host is pool coordinator, this updated password is now propagated to the other hosts in the
pool.
The pool secret is a secret shared among the hosts in a pool that enables the host to prove its mem‑
bership to a pool.
Because users with the Pool Admin role can discover this secret, it is good practice to rotate the pool
secret if one of these users leaves your organization or loses their Pool Admin role.
You can rotate the pool secret by using XenCenter or the xe CLI.
XenCenter
To rotate the pool secret for a pool by using XenCenter, complete the following steps:
1. In the Resources pane, select the pool or any host in the pool.
2. On the Pool menu, select Rotate Pool Secret.
When you rotate the pool secret, you are also prompted to change the root password. If you rotated
the pool secret because you think that your environment has been compromised, ensure that you
also change the root password. For more information, see Change the password.
xe CLI
To rotate the pool secret by using the xe CLI, run the following command on a host in the pool:
1 xe pool-secret-rotate
If you rotated the pool secret because you think that your environment has been compromised, en‑
sure that you also change the root password. For more information, see Change the password.
XenServer sends multicast traffic to all guest VMs leading to unnecessary load on host devices by re‑
quiring them to process packets they have not solicited. Enabling IGMP snooping prevents hosts on a
local network from receiving traffic for a multicast group they have not explicitly joined, and improves
the performance of multicast. IGMP snooping is especially useful for bandwidth‑intensive IP multicast
applications such as IPTV.
Notes:
• IGMP snooping is available only when the network back‑end uses Open vSwitch.
• When enabling this feature on a pool, it may also be necessary to enable IGMP querier on
one of the physical switches. Or else, multicast in the sub network falls back to broadcast
and may decrease XenServer performance.
• When enabling this feature on a pool running IGMP v3, VM migration or network bond
failover results in IGMP version switching to v2.
• To enable this feature with a GRE network, users must set up an IGMP Querier in the GRE
network. Alternatively, you can forward the IGMP query message from the physical network
into the GRE network. Or else, multicast traffic in the GRE network can be blocked.
You can enable IGMP snooping on a pool by using XenCenter or the xe CLI.
XenCenter
xe CLI
xe pool-list
After enabling IGMP snooping, you can view the IGMP snooping table using the xe CLI.
Note:
You can get the bridge name using xe network-list. These bridge names can be xenbr0,
xenbr1, xenapi, or xapi0.
If the GROUP is a multicast group address, this means an IGMP Report message was received on the
associated switch port. This means that a receiver (member) of the multicast group is listening on this
port.
14 0 227.0.0.1 15
1 0 querier 24
The first record shows that there is a receiver listening on port 14 for the multicast group 227.0.0.1.
The Open vSwitch forwards traffic destined for the 227.0.0.1 multicast group to listening ports for this
group only (in this example, port 14), rather than broadcasting to all ports. The record linking port
14 and group 227.0.0.1 was created 15 seconds ago. By default, the timeout interval is 300 seconds.
This means that if the switch does not receive any further IGMP Report messages on port 14 for 300
seconds after adding the record, the record expires and is removed from the table.
In the second record, the GROUP is querier, meaning that IGMP Query messages have been received
on the associated port. A querier periodically sends IGMP Query messages, which are broadcasted to
all switch ports, to determine which network nodes are listening on a multicast group. Upon receiv‑
ing an IGMP Query message, the receiver responds with an IGMP Report message, which causes the
receiver’s multicast record to refresh and avoid expiration.
The VLAN column indicates to the VLAN that a receiver/querier lives. ‘0’means native VLAN. If you
want to run multicast on some tagged VLAN, ensure that there are records on the VLAN.
Note:
For the VLAN scenario, you should have a querier record with a VLAN column value equal to the
VLAN ID of the network, otherwise multicast won’t work in the VLAN network.
During the live migration of a VM, its memory is transferred as a data stream between two hosts using
the network. The migration stream compression feature compresses this data stream, speeding up
the memory transfer on slow networks. This feature is disabled by default, but this can be changed
by using XenCenter or the xe CLI. For more information, see Pool Properties ‑ Advanced and Pool para‑
meters. Alternatively, you can enable compression when migrating a VM by using the command line.
For more information, see the vm-migrate command in VM Commands.
Certificate verification
When certificate verification is enabled for a pool, all TLS communication endpoints on its manage‑
ment network use certificates to validate the identity of their peers before transmitting confidential
information.
Behavior
Connections initiated by a XenServer host on the management network require the destination end‑
point to provide a TLS certificate to verify its identity. This requirement affects the following items
that are part of the pool or interact with the pool:
Certificate verification is compatible with both the self‑signed certificates provided by XenServer and
user‑installed certificates signed by a trusted authority. For more information, see Install a TLS certifi‑
cate on your host.
Each XenServer host in a pool has two certificates that identify it:
• Pool‑internal identity certificates are used to secure communications between hosts within the
pool. For communication within the pool, XenServer always uses self‑signed certificates.
• Server identity certificates are used to verify the identity of a XenServer host to any client ap‑
plications that communicate with the pool on the management network. For communication
between the host and a client application, you can use self‑signed certificates or you can install
your own TLS certificates on your hosts.
When a host first joins the pool or a client first makes a connection to the pool, the pool trusts the
connection. During this first connection, certificates are exchanged between the pool and the join‑
ing host or the connecting client. For all subsequent communications by this host or client on the
management network, the certificates are used to verify the identity of the parties involved in the
communication.
We recommend that you enable certificate verification on all your hosts and pools. For a XenServer
host to successfully join a pool, both the host and the pool must have certificate verification either
enabled or disabled. If certificate verification is enabled on one and not the other, the join opera‑
tion is not successful. XenCenter provides a warning message that advises you to enable certificate
verification on the pool or on the joining host.
When a host leaves a pool with certificate verification enabled, both the host and the pool delete the
certificates that relate to the other.
The Workload Balancing virtual appliance can be used with certificate verification. You must ensure
that the Workload Balancing self‑signed certificates are installed into your XenServer host.
The XenServer Conversion Manager virtual appliance does not connect to XenServer hosts and so is
exempt from the certification checking requirement when it acts as a TLS client end point.
Certificate verification is enabled by default on fresh installations of XenServer 8 and later. If you up‑
grade from an earlier version of XenServer or Citrix Hypervisor, certificate verification is not enabled
automatically and you must enable it. XenCenter prompts you to enable certificate verification the
next time you connect to the upgraded pool.
Before enabling certificate verification on a pool, ensure that no operations are running in the pool.
• When first connecting XenCenter to a pool without certificate verification enabled, you are
prompted to enable it. Click Yes, Enable certificate verification.
• On the General tab of the pool, right‑click the entry Certificate Verification and choose Enable
Certificate Verification from the menu.
To enable certificate verification for a pool, run the following command in the console of a host in the
pool:
1 xe pool-enable-tls-verification
Managing certificates
You can install, view information about, and reset the certificates that are used to verify the identity
of a host.
Installing certificates
You can install your own TLS certificate for the host to present as its identity certificate when receiving
connections from client applications on the management network.
• In XenCenter, look in the General tab for the pool. The General section has an entry for Cer‑
tificate Verification which shows whether certificate verification is enabled or disabled. This
tab also contains a Certificates section that lists the name, validity, and thumbprint for the CA
certificates.
• In XenCenter, go to the General tab for that host. The Certificates section shows the
thumbprint and the validity dates for the server identity certificate and the pool‑internal
identity certificate.
1 xe certificate-list
You can refresh the pool‑internal identity certificate by using the xe CLI:
1. Find the UUID of the host whose certificate you want to reset by running the following com‑
mand:
1 xe host-list
1 xe host-refresh-server-certificate host=<host_uuid>
Note:
Any host selector parameter can be used with this command to indicate the host to reset
the certificate on.
You can reset the server identity certificate from XenCenter or the xe CLI. Resetting a certificate deletes
the certificate from the host and installs a new self‑signed certificate in its place.
Alternatively, in the Server menu, you can go to Certificates > Reset Certificate.
When you reset a certificate, any existing connections to the XenServer host are disconnected —in‑
cluding the connection between XenCenter and the host. XenCenter reconnects automatically to the
host after a certificate reset.
To reset a certificate by using the xe CLI:
1. Find the UUID of the host whose certificate you want to reset by running the following com‑
mand:
1 xe host-list
1 xe host-reset-server-certificate host=<host_uuid>
Note:
Any host selector parameter can be used with this command to indicate the XenServer host
to reset the certificate on.
When you reset a certificate, any existing connections to the XenServer host are disconnected —in‑
cluding the connection between XenCenter and the host. XenCenter reconnects automatically to the
host after a certificate reset.
Expiry alerts
XenCenter shows alerts in the Notifications view when your server identity certificates, pool‑internal
identity certificates, or pool CA certificates are close to their expiry date.
We do not recommend that you disable certificate verification after it has been enabled on a host or
pool. However, XenServer provides commands that can be used to disable certificate verification on
a per host basis when troubleshooting problems with certificates.
To temporarily disable certificate verification, run the following command on the host console:
1 xe host-emergency-disable-tls-verification
XenCenter shows an alert in the Notifications view when certificate verification is disabled on a host
in a pool where the feature is enabled.
After you have resolved any issues with certificates on the host, ensure that you enable certificate
verification on it again. To enable certificate verification again, run the following command on the
host console:
1 xe host-emergency-reenable-tls-verification
Clustered pools
Clustering provides extra features that are required for resource pools that use GFS2 SRs. For more
information about GFS2, see Configure storage.
A cluster is a pool of up to 16 XenServer hosts that are more closely connected and coordinated than
hosts in non‑clustered pools. The hosts in the cluster maintain constant communication with each
other on a selected network. All hosts in the cluster are aware of the state of every host in the cluster.
This host coordination enables the cluster to control access to the contents of the GFS2 SR.
Note:
The clustering feature only benefits pools that contain a GFS2 SR. If your pool does not contain
a GFS2 SR, do not enable clustering in your pool.
Quorum
Each host in a cluster must always be in communication with the majority of hosts in the cluster (in‑
cluding itself). This state is known as a host having quorum. If a host does not have quorum, that host
self‑fences.
The number of hosts that must be in communication to initially achieve quorum can be different to
the number of hosts a cluster requires to keep quorum.
The following table summarizes this behavior. The value of n is the total number of hosts in the clus‑
tered pool.
Odd‑numbered pools
To achieve the quorum value for an odd‑numbered pool you require half of one more than the total
number of hosts in the cluster: (n+1)/2. This is also the minimum number of hosts that must remain
contactable for the pool to remain quorate.
For example, in a 5‑host clustered pool, 3 hosts must be contactable for the cluster to both become
active and remain quorate [(5+1)/2 = 3].
Where possible it is recommended to use an odd number of hosts in a clustered pool as this ensures
that hosts are always able to determine if they have a quorate set.
Even‑numbered pools
When an even‑numbered clustered pool powers up from a cold start, (n/2)+1 hosts must be available
before the hosts have quorum. After the hosts have quorum, the cluster becomes active.
However, an active even‑numbered pool can remain quorate if the number of contactable hosts is at
least n/2. As a result, it is possible for a running cluster with an even number of hosts to split exactly
in half. The running cluster decides which half of the cluster self‑fences and which half of the cluster
has quorum. The half of the cluster that contains the node with the lowest ID that was seen as active
before the cluster split remains active and the other half of the cluster self‑fences.
For example, in a 4‑host clustered pool, 3 hosts must be contactable for the cluster to become active
[4/2 + 1 = 3]. After the cluster is active, to remain quorate, only 2 hosts must be contactable [4/2 = 2]
and that set of hosts must include the host with the lowest node ID known to be active.
Self‑fencing
If a host detects that it does not have quorum, it self‑fences within a few seconds. When a host self‑
fences, it restarts immediately. All VMs running on the host are immediately stopped because the
host does a hard shutdown. In a clustered pool that uses high availability, XenServer restarts the VMs
according to their restart configuration on other pool members. The host that self‑fenced restarts and
attempts to rejoin the cluster.
If the number of live hosts in the cluster becomes less than the quorum value, all the remaining hosts
lose quorum.
In an ideal scenario, your clustered pool always has more live hosts than are required for quorum and
XenServer never fences. To make this scenario more likely, consider the following recommendations
when setting up your clustered pool:
• Use a dedicated bonded network for the cluster network. Ensure that the bonded NICs are on
the same L2 segment. For more information, see Networking.
• Configure storage multipathing between the pool and the GFS2 SR. For more information, see
Storage multipathing.
• All XenServer hosts in the clustered pool must have at least 2 GiB of control domain memory.
Depending on your environment, your hosts might require more control domain memory than
this. If you have insufficient control domain memory on your hosts, your pool can experience
network instabililty. Network instability can cause problems for a clustered pool with GFS2 SRs.
For information about changing the amount of control domain memory and monitoring the
memory behavior, see Memory usage.
• All hosts in the cluster must use static IP addresses for the cluster network.
• We recommend that you use clustering only in pools containing at least three hosts, as pools of
two hosts are sensitive to self‑fencing the entire pool.
• If you have a firewall between the hosts in your pool, ensure that hosts can communicate on the
cluster network using the following ports:
• If you are clustering an existing pool, ensure that high availability is disabled. You can enable
high availability again after clustering is enabled.
• We strongly recommend that you use a bonded network for your clustered pool that is not used
for any other traffic.
If you prefer, you can set up clustering on your pool by using XenCenter. For more information, see
the XenCenter product documentation.
Note:
We strongly recommend that you use a dedicated bonded network for your clustered pool.
Do not use this network for any other traffic.
On the XenServer host that you want to be the pool coordinator, complete the following steps:
1 xe network-create name-label=bond0
1 xe pif-list
d) Create your bonded network in either active‑active mode, active‑passive mode, or LACP
bond mode. Depending on the bond mode you want to use, complete one of the following
actions:
• To configure the bond in active‑active mode (default), use the bond-create com‑
mand to create the bond. Using commas to separate the parameters, specify the
newly created network UUID and the UUIDs of the PIFs to be bonded:
1 xe bond-create network-uuid=<network_uuid> /
2 pif-uuids=<pif_uuid_1>,<pif_uuid_2>,<pif_uuid_3>,<
pif_uuid_4>
Type two UUIDs when you are bonding two NICs and four UUIDs when you are bonding
four NICs. The UUID for the bond is returned after running the command.
• To configure the bond in active‑passive or LACP bond mode, use the same syntax, add
the optional mode parameter, and specify lacp or active-backup:
After you have created your bonded network on the pool coordinator, when you join other
XenServer hosts to the pool, the network and bond information is automatically replicated to
the joining server.
For more information, see Networking.
2. Create a resource pool of at least three XenServer hosts.
Repeat the following steps on each XenServer host that is a (non‑master) pool member:
b) Join the XenServer host to the pool on the pool coordinator by using the following com‑
mand:
The value of the master-address parameter must be set to the fully qualified domain
name of the XenServer host that is the pool coordinator. The password must be the ad‑
ministrator password set when the pool coordinator was installed.
a) Find the UUIDs of the PIFs that belong to the network by using the following command:
1 xe pif-list
4. Enable clustering on your pool. Run the following command on a XenServer host in your re‑
source pool:
1 xe cluster-pool-create network-uuid=<network_uuid>
Provide the UUID of the bonded network that you created in an earlier step.
You can destroy a clustered pool. After you destroy a clustered pool, the pool continues to exist, but
is no longer clustered and can no longer use GFS2 SRs.
1 xe cluster-pool-destroy cluster-uuid=<uuid>
When managing your clustered pool, the following practices can decrease the risk of the pool losing
quorum.
When adding or removing a host on a clustered pool, ensure that all the hosts in the cluster are on‑
line.
You can add or remove a host on a clustered pool by using XenCenter. For more information, see Add
a Server to a Pool and Remove a Server From a Pool.
You can also add or remove a host on a clustered pool by using the xe CLI. For more information, see
Add a host to a pool by using the xe CLI and Remove XenServer hosts from a resource pool.
When a host is cleanly shut down, it is temporarily removed from the cluster until it is started again.
While the host is shut down, it does not count toward the quorum value of the cluster. The host ab‑
sence does not cause other hosts to lose quorum.
However, if a host is forcibly or unexpectedly shut down, it is not removed from the cluster before it
goes offline. This host does count toward the quorum value of the cluster. Its shutdown can cause
other hosts to lose quorum.
If it is necessary to shut down a host forcibly, first check how many live hosts are in the cluster. You
can do this with the command corosync-quorumtool. In the command output, the number of
live hosts is the value of Total votes: and the number of live hosts required to retain quorum is
the value of Quorum:.
• If the number of live hosts is the same as the number of hosts needed to remain quorate, do not
forcibly shut down the host. Doing so causes the whole cluster to fence.
Instead, attempt to recover other hosts and increase the live hosts number before forcibly shut‑
ting down the host.
• If the number of live hosts is close to the number of hosts needed to remain quorate, you can
forcibly shut down the host. However, this makes the cluster more vulnerable to fully fencing if
other hosts in the pool have issues.
Always try to restart the shut down host as soon as possible to increase the resiliency of your cluster.
Before doing something on a host that might cause that host to lose quorum, put the host into main‑
tenance mode. When a host is in maintenance mode, running VMs are migrated off it to another host
in the pool. Also, if that host was the pool coordinator, that role is passed to a different host in the
pool. If your actions cause a host in maintenance mode to self‑fence, you don’t lose any VMs or lose
your XenCenter connection to the pool.
Hosts in maintenance mode still count towards the quorum value for the cluster.
You can only change the IP address of a host that is part of a clustered pool when that host is in main‑
tenance mode. Changing the IP address of a host causes the host to leave the cluster. When the IP
address has been successfully changed, the host rejoins the cluster. After the host rejoins the cluster,
you can take it out of maintenance mode.
It is important to recover hosts that have self‑fenced. While these cluster members are offline, they
count towards the quorum number for the cluster and decrease the number of cluster members that
are contactable. This situation increases the risk of a subsequent host failure causing the cluster to
lose quorum and shut down completely.
Having offline hosts in your cluster also prevents you from performing certain actions. In a clustered
pool, every member of the pool must agree to every change of pool membership before the change
can be successful. If a cluster member is not contactable, XenServer prevents operations that change
cluster membership (such as host add or host remove).
If one or more offline hosts cannot be recovered, you can tell the clustered pool to forget them. These
hosts are permanently removed from the pool. After hosts are removed from the clustered pool, they
no longer count towards the quorum value.
1 xe host-forget uuid=<host_uuid>
After a clustered pool is told to forget a host, the host cannot be added back into the pool.
To rejoin the clustered pool, you must reinstall XenServer on the host so that it appears as a new host
to the pool. You can then join the host to the clustered pool in the usual way.
If you encounter issues with your clustered pool, see Troubleshoot clustered pools.
Constraints
XenServer pools that use GFS2 to thin provision their shared block storage are clustered. These pools
behave differently to pools that use shared file‑based storage or LVM with shared block storage. As a
result, there are some specific issues that might occur in XenServer clustered pools and GFS2 environ‑
ments.
Use the following information to troubleshoot minor issues that might occur when using this fea‑
ture.
All my hosts can ping each other, but I can’t create a cluster. Why?
The clustering mechanism uses specific ports. If your hosts can’t communicate on these ports (even
if they can communicate on other ports), you can’t enable clustering for the pool.
Ensure that the hosts in the pool can communicate on the following ports:
If there are any firewalls or similar between the hosts in the pool, ensure that these ports are open.
If you have previously configured HA in the pool, disable the HA before enabling clustering.
Why am I getting an error when I try to join a new host to an existing clustered pool?
When clustering is enabled on a pool, every pool membership change must be agreed by every mem‑
ber of the cluster before it can succeed. If a cluster member isn’t contactable, operations that change
cluster membership (such as host add or host remove) fail.
1. Ensure that all of your hosts are online and can be contacted.
2. Ensure that the hosts in the pool can communicate on the following ports:
3. Ensure that the joining host has an IP address allocated on the NIC that joins the cluster network
of the pool.
4. Ensure that no host in the pool is offline when a new host is trying to join the clustered pool.
5. If an offline host cannot be recovered, mark it as dead to remove it from the cluster. For more
information, see A host in my clustered pool is offline and I can’t recover it. How do I remove
the host from my cluster?
What do I do if some members of the clustered pool aren’t joining the cluster
automatically?
This issue might be caused by members of the clustered pool losing synchronization.
To resync the members of the clustered pool, use the following command:
1 xe cluster-pool-resync cluster-uuid=<cluster_uuid>
If the issue persists, you can try to reattach the GFS2 SR. You can do this task by using the xe CLI or
through XenCenter.
1. Detach the GFS2 SR from the pool. On each host, run the xe CLI command xe pbd-unplug
uuid=<uuid_of_pbd>.
If the preceding command is unsuccessful, you can forcibly disable a clustered pool by running
xe cluster-host-force-destroy uuid=<cluster_host> on every host in the
pool.
1. In the pool Storage tab, right‑click on the GFS2 SR and select Detach….
2. From the toolbar, select Pool > Properties.
3. In the Clustering tab, deselect Enable clustering.
4. Click OK to apply your change.
5. From the toolbar, select Pool > Properties.
6. In the Clustering tab, select Enable clustering and choose the network to use for clustering.
7. Click OK to apply your change.
8. In the pool Storage tab, right‑click on the GFS2 SR and select Repair.
If your host self‑fenced, it might have rejoined the cluster when it restarted. To see if a host has self‑
fenced and recovered, you can check the /var/opt/xapi-clusterd/boot-times file to see
the times the host started. If there are start times in the file that you did not expect to see, the host
has self‑fenced.
There are many possible reasons for a host to go offline. Depending on the reason, the host can either
be recovered or not.
The following reasons for a host to be offline are more common and can be addressed by recovering
the host:
• Clean shutdown
• Forced shutdown
• Temporary power failure
• Reboot
• Network partition
• Network switch failure
These issues can be addressed by replacing hardware or by marking failed hosts as dead.
A host in my clustered pool is offline and I can’t recover it. How do I remove the host
from my cluster?
You can tell the cluster to forget the host. This action removes the host from the cluster permanently
and decreases the number of live hosts required for quorum.
1 xe host-forget uuid=<host_uuid>
This command removes the host from the cluster permanently and decreases the number of live hosts
required for quorum.
Note:
If the host isn’t offline, this command can cause data loss. You’re asked to confirm that you’re
sure before proceeding with the command.
After a host is forgotten, it can’t be added back into the cluster. To add this host back into the cluster,
you must do a fresh installation of XenServer on the host.
I’ve repaired a host that was marked as dead. How do I add it back into my cluster?
A XenServer host that has been marked as dead can’t be added back into the cluster. To add this
system back into the cluster, you must do a fresh installation of XenServer. This fresh installation
appears to the cluster as a new host.
What do I do if my cluster keeps losing quorum and its hosts keep fencing?
If one or more of the XenServer hosts in the cluster gets into a fence loop because of continuously los‑
ing and gaining quorum, you can boot the host with the nocluster kernel command‑line argument.
Connect to the physical or serial console of the host and edit the boot arguments in grub.
Example:
1 /boot/grub/grub.cfg
2 menuentry 'XenServer' {
3
4 search --label --set root root-oyftuj
What happens when the pool coordinator gets restarted in a clustered pool?
In most cases, the behavior when the pool coordinator is shut down or restarted in a clustered pool is
the same as that when another pool member shuts down or restarts.
How the host is shut down or restarted can affect the quorum of the clustered pool. For more infor‑
mation about quorum, see Quorum.
Why has my pool vanished after a host in the clustered pool is forced to shut down?
If you shut down a host normally (not forcibly), it’s temporarily removed from quorum calculations
until it’s turned back on. However, if you forcibly shut down a host or it loses power, that host still
counts towards quorum calculations. For example, if you had a pool of 3 hosts and forcibly shut down
2 of them the remaining host fences because it no longer has quorum.
Try to always shut down hosts in a clustered pool cleanly. For more information, see Manage your
clustered pool.
Why did all hosts within the clustered pool restart at the same time?
All hosts in an active cluster are considered to have lost quorum when the number of contactable hosts
in the pool is less than these values:
The letter n indicates the total number of hosts in the clustered pool. For more information about
quorum, see Quorum.
In this situation, all hosts self‑fence and you see all hosts restarting.
To diagnose why the pool lost quorum, the following information can be useful:
• In XenCenter, check the Notifications section for the time of the issue to see whether self‑
fencing occurred.
• On the cluster hosts, check /var/opt/xapi-clusterd/boot-times to see whether a
reboot occurred at an unexpected time.
• In Crit.log, check whether any self‑fencing messages are outputted.
• Review the dlm_tool status command output for fencing information.
Example dlm_tool status output:
1 dlm_tool status
2
3 cluster nodeid 1 quorate 1 ring seq 8 8
4 daemon now 4281 fence_pid 0
5 node 1 M add 3063 rem 0 fail 0 fence 0 at 0 0
6 node 2 M add 3066 rem 0 fail 0 fence 0 at 0 0
When collecting logs for debugging, collect diagnostic information from all hosts in the cluster. In the
case where a single host has self‑fenced, the other hosts in the cluster are more likely to have useful
information.
Collect full server status reports for the hosts in your clustered pool. For more information, see
XenServer server status reports.
If you have a clustered pool with an even number of hosts, the number of hosts required to achieve
quorum is one more than the number of hosts required to retain quorum. For more information about
quorum, see Quorum.
If you are in an even‑numbered pool and have recovered half of the hosts, you must recover one more
host before you can recover the cluster.
Why do I see an Invalid token error when changing the cluster settings?
When updating the configuration of your cluster, you might receive the following error message about
an invalid token ("[[\"InternalError\",\"Invalid token\"]]").
1. (Optional) Back up the current cluster configuration by collecting a server status report that
includes the xapi‑clusterd and system logs.
In the pool Storage tab, right‑click on the GFS2 SR and select Detach….
3. On any host in the cluster, run this command to forcibly destroy the cluster:
1 xe cluster-pool-force-destroy cluster-uuid=<uuid>
In the pool Storage tab, right‑click on the GFS2 SR and select Repair.
Manage users
Defining users, groups, roles and permissions allows you to control who has access to your XenServer
hosts and pools and what actions they can perform.
When you first install XenServer, a user account is added to XenServer automatically. This account is
the local super user (LSU), or root, which XenServer authenticates locally.
The LSU, or root, is a special user account intended for system administration and has all permissions.
In XenServer, the LSU is the default account at installation. XenServer authenticates the LSU account.
LSU does not require any external authentication service. If an external authentication service fails,
the LSU can still log in and manage the system. The LSU can always access the XenServer physical
server through SSH.
You can create more users by adding the Active Directory accounts through either XenCenter’s Users
tab or the xe CLI. If your environment does not use Active Directory, you are limited to the LSU ac‑
count.
Note:
When you create users, XenServer does not assign newly created user accounts RBAC roles au‑
tomatically. Therefore, these accounts do not have any access to the XenServer pool until you
assign them a role.
These permissions are granted through roles, as discussed in the Authenticating users with Active Di‑
rectory (AD) section.
If you want to have multiple user accounts on a host or a pool, you must use Active Directory user
accounts for authentication. AD accounts let XenServer users log on to a pool using their Windows
domain credentials.
Note:
You can enable LDAP channel binding and LDAP signing on your AD domain controllers. For more
information, see Microsoft Security Advisory.
You can configure varying levels of access for specific users by enabling Active Directory authentica‑
tion, adding user accounts, and assigning roles to those accounts.
Active Directory users can use the xe CLI (passing appropriate -u and -pw arguments) and also con‑
nect to the host using XenCenter. Authentication is done on a per‑resource pool basis.
Subjects control access to user accounts. A subject in XenServer maps to an entity on your Active Di‑
rectory server (either a user or a group). When you enable external authentication, XenServer checks
the credentials used to create a session against the local root credentials and then against the subject
list. To permit access, create a subject entry for the person or group you want to grant access to. You
can use XenCenter or the xe CLI to create a subject entry.
If you are familiar with XenCenter, note that the xe CLI uses slightly different terminology to refer to
Active Directory and user account features:
Even though XenServer is Linux‑based, XenServer lets you use Active Directory accounts for XenServer
user accounts. To do so, it passes Active Directory credentials to the Active Directory domain con‑
troller.
When you add Active Directory to XenServer, Active Directory users and groups become XenServer
subjects. The subjects are referred to as users in XenCenter. Users/groups are authenticated by using
Active Directory on logon when you register a subject with XenServer. Users and groups do not need
to qualify their user name by using a domain name.
To qualify a user name, you must type the user name in Down‑Level log on Name format, for example,
mydomain\myuser.
Note:
By default, if you did not qualify the user name, XenCenter attempts to log in users to AD authen‑
tication servers using the domain to which it is joined. The exception to this is the LSU account,
which XenCenter always authenticates locally (that is, on the XenServer) first.
1. The credentials supplied when connecting to a host are passed to the Active Directory domain
controller for authentication.
2. The domain controller checks the credentials. If they are invalid, the authentication fails imme‑
diately.
3. If the credentials are valid, the Active Directory controller is queried to get the subject identifier
and group membership associated with the credentials.
4. If the subject identifier matches the one stored in the XenServer, authentication succeeds.
When you join a domain, you enable Active Directory authentication for the pool. However, when a
pool joins a domain, only users in that domain (or a domain with which it has trust relationships) can
connect to the pool.
Note:
Manually updating the DNS configuration of a DHCP‑configured network PIF is unsupported and
can cause AD integration, and therefore user authentication, to fail or stop working.
XenServer supports use of Active Directory servers using Windows 2008 or later.
To authenticate Active Directory for XenServer hosts, you must use the same DNS server for both the
Active Directory server (configured to allow interoperability) and the XenServer host.
In some configurations, the Active Directory server can provide the DNS itself. This can be achieved
either using DHCP to provide the IP address and a list of DNS servers to the XenServer host. Alterna‑
tively, you can set the values in the PIF objects or use the installer when a manual static configuration
is used.
We recommend enabling DHCP to assign host names. Do not assign the hostnames localhost or
linux to hosts.
Warning:
• XenServer labels its AD entry on the AD database using its hostname. If two XenServer hosts with
the same hostname are joined to the same AD domain, the second XenServer overwrites the AD
entry of the first XenServer. The overwriting occurs regardless of whether the hosts belong to
the same or different pools. This can cause the AD authentication on the first XenServer to stop
working.
You can use the same host name in two XenServer hosts, as long as they join different AD do‑
mains.
• The XenServer hosts can be in different time‑zones, because it is the UTC time that is compared.
To ensure that synchronization is correct, you can use the same NTP servers for your XenServer
pool and the Active Directory server.
• Mixed‑authentication pools are not supported. You cannot have a pool where some hosts in the
pool are configured to use Active Directory and some are not.
• The XenServer Active Directory integration uses the Kerberos protocol to communicate with the
Active Directory servers. Therefore, XenServer does not support communicating with Active
Directory servers that do not use Kerberos.
• For external authentication using Active Directory to be successful, clocks on your XenServer
hosts must be synchronized with the clocks on your Active Directory server. When XenServer
joins the Active Directory domain, the synchronization is checked and authentication fails if
there is too much skew between the servers.
Warning:
Host names must consist solely of no more than 63 alphanumeric characters, and must not be
purely numeric.
A limitation in recent SSH clients means that SSH does not work for usernames that contain any
of the following characters: { } []|&. Ensure that your usernames and Active Directory server
names do not contain any of these characters.
When you add a host to a pool after enabling Active Directory authentication, you are prompted to
configure Active Directory on the host joining the pool. When prompted for credentials on the joining
host, type Active Directory credentials with sufficient privileges to add hosts to that domain.
Ensure that the following firewall ports are open for outbound traffic in order for XenServer to access
the domain controllers.
53 UDP/TCP DNS
88 UDP/TCP Kerberos 5
123 UDP NTP
137 UDP NetBIOS Name Service
139 TCP NetBIOS Session (SMB)
389 UDP/TCP LDAP
445 TCP SMB over TCP
464 UDP/TCP Machine password changes
636 UDP/TCP LDAP over SSL
3268 TCP Global Catalog Search
Notes:
• To view the firewall rules on a Linux computer using iptables, run the following command:
iptables -nL.
Winbind
XenServer uses Winbind for authenticating Active Directory (AD) users with the AD server and to en‑
crypt communications with the AD server.
• Domain user names that include any of the special characters +<>”=/%@:,;\‘
• Domain group names that include any of the special characters ,;\‘
Configuring Winbind Configure Winbind behavior with the following configuration options, which
can be included in the /etc/xapi.conf file:
The default value is 1209600 seconds (14 days). We recommend that you keep the default value
or do not decrease the value below the default value to guarantee enough time to synchronize
the new password between domain controllers.
The legacy option is insecure and we recommend that you only use it to debug issues.
For improved security, we recommend that you enforce AES encryption. To do this,
2. Configure the domain controller to enable The other domain supports Kerberos AES
Encryption in domain trust.
For more information, see Method 3: Configure the trust to support AES128 and AES 256
encryption instead of RC4 encryption in the Microsoft documentation.
Do not restart the toolstack while HA is enabled. If possible, temporarily disable HA before
restarting the toolstack.
• winbind_cache_time: Winbind caches some domain information locally. The value of this
option defines the number of seconds between each cache refresh. The default is 60 seconds.
After you update any of these configuration options, restart the toolstack.
How does XenServer manage the machine account password for AD integration?
Similarly to Windows client machines, Winbind automatically updates the machine account password.
Winbind automatically updates the machine account password every 14 days or as specified by the
configuration option winbind_machine_pwd_timeout.
External authentication using Active Directory can be configured using either XenCenter or the CLI
using the following command.
1 xe pool-enable-external-auth auth-type=AD \
2 service-name=full-qualified-domain \
3 config:user=username \
4 config:pass=password
The user specified must have Add/remove computer objects or workstations privilege,
which is the default for domain administrators.
If you are not using DHCP on the network used by Active Directory and your XenServer hosts, use the
following approaches to set up your DNS:
1. Set up your domain DNS suffix search order for resolving non‑FQDN entries:
1 xe pif-param-set uuid=pif_uuid_in_the_dns_subnetwork \
2 "other-config:domain=suffix1.com suffix2.com suffix3.com"
3. Manually set the management interface to use a PIF that is on the same network as your DNS
server:
1 xe host-management-reconfigure pif-uuid=pif_in_the_dns_subnetwork
Note:
External authentication is a per‑host property. However, we recommend that you enable and
disable external authentication on a per‑pool basis. A per‑pool setting allows XenServer to deal
with failures that occur when enabling authentication on a particular host. XenServer also rolls
back any changes that may be required, ensuring a consistent configuration across the pool. Use
the host-param-list command to inspect properties of a host and to determine the status
of external authentication by checking the values of the relevant fields.
1 xe pool-disable-external-auth
User authentication
To allow a user access to your XenServer host, you must add a subject for that user or a group that
they are in. (Transitive group memberships are also checked in the normal way. For example, adding
a subject for group A, where group A contains group B and user 1 is a member of group B would
permit access to user 1.) If you want to manage user permissions in Active Directory, you can cre‑
ate a single group that you then add and delete users to/from. Alternatively, you can add and delete
individual users from XenServer, or a combination of users and groups as appropriate for your authen‑
tication requirements. You can manage the subject list from XenCenter or using the CLI as described
in the following section.
When authenticating a user, the credentials are first checked against the local root account, allowing
you to recover a system whose AD server has failed. If the credentials (user name and password) do
not match, then an authentication request is made to the AD server. If the authentication is successful,
the user’s information is retrieved and validated against the local subject list. Access is denied if the
authentication fails. Validation against the subject list succeeds if the user or a group in the transitive
group membership of the user is in the subject list.
Note:
When using Active Directory groups to grant access for Pool Administrator users who require host
ssh access, the size of the AD group must not exceed 500 users.
1 xe subject-add subject-name=entity_name
The entity_name is the name of the user or group to which you want to grant access. You can include
the domain of the entity (for example, ‘xendt\user1’as opposed to ‘user1’) although the behavior is
the same unless disambiguation is required.
Find the user’s subject identifier. The identifier is the user or the group containing the user. Removing
a group removes access to all users in that group, provided they are not also specified in the subject
list. Use the subject list command to find the user’s subject identifier. :
1 xe subject-list
To apply a filter to the list, for example to find the subject identifier for a user user1 in the testad
domain, use the following command:
1 xe subject-list other-config:subject-name='testad\user1'
Remove the user using the subject-remove command, passing in the subject identifier you
learned in the previous step:
1 xe subject-remove subject-uuid=subject_uuid
You can end any current session this user has already authenticated. For more information, see Ter‑
minating all authenticated sessions using xe and Terminating individual user sessions using xe in the
following section. If you do not end sessions, users with revoked permissions may continue to access
the system until they log out.
Run the following command to identify the list of users and groups with permission to access your
XenServer host or pool:
1 xe subject-list
When a user is authenticated, they can access the host until they end their session, or another user
ends their session. Removing a user from the subject list, or removing them from a group in the sub‑
ject list, doesn’t automatically revoke any already‑authenticated sessions that the user has. Users
can continue to access the pool using XenCenter or other API sessions that they have already created.
XenCenter and the CLI provide facilities to end individual sessions, or all active sessions forcefully.
See the XenCenter documentation for information on procedures using XenCenter, or the following
section for procedures using the CLI.
Run the following CLI command to end all authenticated sessions using xe:
1 xe session-subject-identifier-logout-all
1. Determine the subject identifier whose session you want to log out. Use either the session-
subject-identifier-list or subject-list xe commands to find the subject iden‑
tifier. The first command shows users who have sessions. The second command shows all
users but can be filtered. For example, by using a command like xe subject-list other
-config:subject-name=xendt\\user1. You may need a double backslash as shown
depending on your shell).
2. Use the session-subject-logout command, passing the subject identifier you have de‑
termined in the previous step as a parameter, for example:
1 xe session-subject-identifier-logout subject-identifier=subject_id
Leave an AD domain
Warning:
When you leave the domain, any users who authenticated to the pool or host with Active Direc‑
tory credentials are disconnected.
Use XenCenter to leave an AD domain. For more information, see the XenCenter documentation. Al‑
ternately run the pool-disable-external-auth command, specifying the pool UUID if neces‑
sary.
Note:
Leaving the domain does not delete the host objects from the AD database. Refer to the Active
Directory documentation for information about how to detect and remove your disabled host
entries.
The local super user (LSU), or root, is a special user account used for system administration and has
all rights or permissions. The local super user is the default account at installation in XenServer. The
LSU is authenticated through XenServer and not through an external authentication service. If the
external authentication service fails, the LSU can still log in and manage the system. The LSU can
always access the XenServer physical host through SSH.
RBAC process
The following section describes the standard process for implementing RBAC and assigning a user or
group a role:
1. Join the domain. For more information, see Enabling external authentication on a pool.
2. Add an Active Directory user or group to the pool. This becomes a subject. For more information,
see To add a subject to RBAC.
3. Assign (or change) the subject’s RBAC role. For more information, see To assign an RBAC role to
a subject.
Roles
• Pool Administrator (Pool Admin) –the same as the local root. Can perform all operations.
Note:
The local super user (root) has the “Pool Admin”role. The Pool Admin role has the same
permissions as the local root.
If you remove the Pool Admin role from a user, consider also changing the root password
and rotating the pool secret. For more information, see Pool Security.
• Pool Operator (Pool Operator) –can do everything apart from adding/removing users and chang‑
ing their roles. This role is focused mainly on host and pool management (that is, creating stor‑
age, making pools, managing the hosts and so on.)
• Virtual Machine Power Administrator (VM Power Admin) –creates and manages Virtual Machines.
This role is focused on provisioning VMs for use by a VM operator.
• Virtual Machine Administrator (VM Admin) –similar to a VM Power Admin, but cannot migrate
VMs or perform snapshots.
• Virtual Machine Operator (VM Operator) –similar to VM Admin, but cannot create/destroy VMs –
but can perform start/stop lifecycle operations.
• Read‑only (Read Only) –can view resource pool and performance data.
Note:
• To apply updates to XenServer 8 pools, you must be logged in to XenCenter as a Pool Ad‑
ministrator or Pool Operator, or using a local root account.
• When using Active Directory groups to grant access for Pool Administrator users who require
host SSH access, the number of users in the Active Directory group must not exceed 500.
For a summary of the permissions available for each role and for information on the operations avail‑
able for each permission, see Definitions of RBAC roles and permissions in the following section.
When you create a user in XenServer, you must first assign a role to the newly created user before they
can use the account. XenServer does not automatically assign a role to the newly created user. As a
result, these accounts do not have any access to XenServer pool until you assign them a role.
1. Modify the subject to role mapping. This requires the assign/modify role permission, only avail‑
able to a Pool Administrator.
The following table summarizes which permissions are available for each role. For details on the op‑
erations available for each permission, see Definitions of permissions.
Assign/modify X
roles
Log in to X
(physical)
server
consoles
(through
SSH and
XenCenter)
Server X
backup/re‑
store
Install a TLS X
certificate
on a server
Apply X X
updates to
a pool
Rolling Pool X
Upgrade
Import X X
OVF/OVA
packages;
import disk
images
Import XVA X X X
packages
Export X X X X
OVF/O‑
VA/XVA
packages
Set cores X X X X
per socket
Convert X
VMs using
XenServer
Conversion
Manager
Switch‑port X X
locking
Multipathing X X
Log out X X
active user
connec‑
tions
Monitor X
host and
dom0
resources
with NRPE
Monitor X
host and
dom0
resources
with SNMP
Create and X X
dismiss
alerts
Cancel task X X
of any user
Pool man‑ X X
agement
Live X X X
migration
Storage live X X X
migration
VM X X X
advanced
operations
VM cre‑ X X X X
ate/destroy
operations
VM change X X X X X
CD media
VM change X X X X X
power state
View VM X X X X X
consoles
vApps X X
(Add/Modi‑
fy/Delete
vApps)
vApps X X
(Start/Shut‑
down
vApps)
vApps (Ad‑ X X
d/Remove
VMs to an
existing
vApp)
vApps (View X X X X X X
vApps)
XenCenter X X X X X
view man‑
agement
operations
Cancel own X X X X X X
tasks
Read audit X X X X X X
logs
Configure, X X
initialize,
enable,
disable
Workload
Balancing
(WLB)
Apply WLB X X
optimiza‑
tion
recommen‑
dations
Accept WLB X X X
placement
recommen‑
dations
Display X X X X X X
WLB config‑
uration
Generate X X X X X X
WLB
reports
Connect to X X X X X X
pool and
read all
pool
metadata
Configure X X
virtual GPU
View virtual X X X X X X
GPU config‑
uration
Gather X X
diagnostic
information
vCPU X X X X
Hotplug
Configure X X X X
changed
block
tracking
List X X X X X
changed
blocks
Configure X X
PVS‑
Accelerator
View PVS‑ X X X X X X
Accelerator
configura‑
tion
Scheduled X X X
Snapshots
(Add/Re‑
move VMs
to existing
Snapshots
Schedules)
Scheduled X X
Snapshots
(Add/Modi‑
fy/Delete
Snapshot
Schedules)
Definitions of permissions
Assign/modify roles:
This permission lets the user grant themself any permission or perform any task.
Warning:
This role lets the user disable the Active Directory integration and all subjects added from Active
Directory.
Warning:
With access to a root shell, the assignee can arbitrarily reconfigure the entire system, including
RBAC.
Server backup/restore:
The ability to restore a backup lets the assignee revert RBAC configuration changes.
Install a TLS certificate on a server:
This permission enables an administrator to install a TLS certificate on a server that runs Citrix Hyper‑
visor 8.2 or later.
Apply updates to a pool:
• Upgrade all hosts in a pool using the Rolling Pool Upgrade wizard.
Set cores‑per‑socket:
• Set the number of cores per socket for the VM’s virtual CPUs
This permission enables the user to specify the topology for the VM’s virtual CPUs.
Convert VMs using XenServer Conversion Manager:
This permission lets the user convert workloads from VMware to XenServer. Convert these workloads
by copying batches of VMware ESXi/vCenter VMs to the XenServer environment.
Switch‑port locking:
This permission lets the user block all traffic on a network by default, or define specific IP addresses
from which a VM can send traffic.
Multipathing:
• Enable multipathing
• Disable multipathing
For more information, see Monitor host and dom0 resources with NRPE.
For more information, see Monitor host and dom0 resources with SNMP.
Create/dismiss alerts:
• Configure XenCenter to generate alerts when resource usage crosses certain thresholds
• Remove alerts from the Alerts view
Warning: A user with this permission can dismiss alerts for the entire pool.
Note: The ability to view alerts is part of the Connect to Pool and read all pool metadata permis‑
sion.
This permission lets the user request XenServer cancel an in‑progress task initiated by any user.
Pool management:
Note: If the management interface is not functioning, no logins can authenticate except local root
logins.
Live migration:
• Migrate VMs from one host to another host when the VMs are on storage shared by both hosts
• Migrate from one host to another host when the VMs are not on storage shared between the two
hosts
• Move Virtual Disk (VDIs) from one SR to another SR
VM advanced operations:
• Migrate VMs
• Start VMs, including specifying physical server
• Resume VMs
This permission provides the assignee with enough privileges to start a VM on a different host if they
are not satisfied with the host XenServer selected.
VM create/destroy operations:
VM change CD media:
• Eject current CD
• Insert new CD
This permission does not include start_on, resume_on, and migrate, which are part of the VM ad‑
vanced operations permission.
View VM consoles:
This permission does not let the user view host consoles.
• Create a vApp
• Delete a vApp
• Change the properties of a vApp
• Start a vApp
• Shutdown a vApp
• Add a VM to a vApp.
• Remove a VM from a vApp
• Configure WLB
• Initialize WLB and change WLB servers
• Enable WLB
• Disable WLB
• Select one of the servers Workload Balancing recommends for placement (“star”recommenda‑
tions)
• View and run WLB reports, including the Pool Audit Trail report
• Log in to pool
• View pool metadata
• View historical performance data
• View logged in users
• View users and roles
• View tasks
• View messages
• Register for and receive events
Changed block tracking can be enabled only for licensed instances of XenServer Premium Edition.
• Compare two VDI snapshots and list the blocks that have changed between them.
Configure PVS‑Accelerator:
• Enable PVS‑Accelerator
• Disable PVS‑Accelerator
• Update PVS‑Accelerator cache configuration
• Add or Remove PVS‑Accelerator cache configuration
Note:
Sometimes, a Read Only user cannot move a resource into a folder in XenCenter, even after re‑
ceiving an elevation prompt and supplying the credentials of a more privileged user. In this case,
log on to XenCenter as the more privileged user and retry the action.
1. The subject is authenticated through the Active Directory server to verify which containing
groups the subject may also belong to.
2. XenServer then verifies which roles have been assigned both to the subject, and to its containing
groups.
3. As subjects can be members of multiple Active Directory groups, they inherit all of the permis‑
sions of the associated roles.
This command returns a list of the currently defined roles, for example:
Note:
This list of roles is static. You cannot add, remove, or modify roles.
1 xe subject-list
This command returns a list of XenServer users, their uuid, and the roles they are associated with:
5 subject-sid: S-1-5-21-1539997073-1618981536-2562117463-2244;
subject-gecos: \
6 user_vm_admin; subject-displayname: user_vm_admin; subject-is-
group: false; \
7 subject-account-disabled: false; subject-account-expired: false;
\
8 subject-account-locked: false;subject-password-expired: false
9 roles (SRO): vm-admin
10
11 uuid ( RO): 4fe89a50-6a1a-d9dd-afb9-b554cd00c01a
12 subject-identifier ( RO): S
-1-5-21-1539997073-1618981536-2562117463-2245
13 other-config (MRO): subject-name: example02\user_vm_op; subject-upn
: \
14 [email protected]; subject-uid: 1823475909; subject-gid:
1823474177; \
15 subject-sid: S-1-5-21-1539997073-1618981536-2562117463-2245; \
16 subject-gecos: user_vm_op; subject-displayname: user_vm_op; \
17 subject-is-group: false; subject-account-disabled: false; \
18 subject-account-expired: false; subject-account-locked: \
19 false; subject-password-expired: false
20 roles (SRO): vm-operator
21
22 uuid ( RO): 8a63fbf0-9ef4-4fef-b4a5-b42984c27267
23 subject-identifier ( RO): S
-1-5-21-1539997073-1618981536-2562117463-2242
24 other-config (MRO): subject-name: example03\user_pool_op; \
25 subject-upn: [email protected]; subject-uid: 1823475906; \
26 subject-gid: 1823474177; subject-s id:
27 S-1-5-21-1539997073-1618981536-2562117463-2242; \
28 subject-gecos: user_pool_op; subject-displayname: user_pool_op; \
29 subject-is-group: false; subject-account-disabled: false; \
30 subject-account-expired: false; subject-account-locked: \
31 false; subject-password-expired: false
32 roles (SRO): pool-operator
To enable existing AD users to use RBAC, create a subject instance within XenServer, either for the AD
user directly, or for the containing groups:
After adding a subject, you can assign it to an RBAC role. You can refer to the role by either by its UUID
or name:
Or
For example, the following command adds a subject with the UUID b9b3d03b-3d10-79d3-8ed7
-a782c5ea13b4 to the Pool Administrator role:
To change the role of a user, it is necessary to remove them from their existing role and add them to a
new role:
The user must log out and log back in to ensure that the new role takes effect. This requires the “Lo‑
gout Active User Connections”permission available to a Pool Administrator or Pool Operator.
If you remove the Pool Admin role from a user, consider also changing the root password and rotating
the pool secret. For more information, see Pool Security.
Warning:
When you add or remove a pool‑admin subject, it can take a few seconds for all hosts in the pool
to accept ssh sessions associated with this subject.
Auditing
The RBAC audit log records any operation taken by a logged‑in user.
• The message records the Subject ID and user name associated with the session that invoked the
operation.
• Any successful operation is also recorded. If the operation failed then the error code is logged.
The following command downloads all the available records of the RBAC audit file in the pool to a file.
If the optional parameter ‘since’is present, then it only downloads the records from that specific point
in time.
1 xe audit-log-get filename=/tmp/auditlog-pool-actions.out
1 xe audit-log-get since=2009-09-24T17:56:20.530Z \
2 filename=/tmp/auditlog-pool-actions.out
1 xe audit-log-get since=2009-09-24T17:56Z \
2 filename=/tmp/auditlog-pool-actions.out
Networking
This section provides an overview of XenServer networking, including networks, VLANs, and NIC
bonds. It also discusses how to manage your networking configuration and troubleshoot it.
Important:
vSwitch is the default network stack of XenServer. Follow the instructions in vSwitch networks
to configure the Linux network stack.
If you are already familiar with XenServer networking concepts, you can skip ahead to Manage net‑
working for information about the following sections:
• Create networks for XenServer hosts that are configured in a resource pool
• Create VLANs for XenServer hosts, either standalone or part of a resource pool
• Create bonds for XenServer hosts that are configured in a resource pool
Note:
The term ‘management interface’is used to indicate the IP‑enabled NIC that carries the manage‑
ment traffic. The term ‘secondary interface’is used to indicate an IP‑enabled NIC configured for
storage traffic.
Networking support
XenServer supports up to 16 physical network interfaces (or up to 4 bonded network interfaces) per
host and up to 7 virtual network interfaces per VM.
Note:
XenServer provides automated configuration and management of NICs using the xe command
line interface (CLI). Do not edit the host networking configuration files directly.
vSwitch networks
• Supports fine‑grained security policies to control the flow of traffic sent to and from a VM.
• Provides detailed visibility about the behavior and performance of all traffic sent in the virtual
network environment.
1 xe host-list params=software-version
In the command output, look for network_backend. When the vSwitch is configured as the net‑
work stack, the output appears as follows:
1 network_backend: openvswitch
When the Linux bridge is configured as the network stack, the output appears as follows:
1 network_backend: bridge
1 xe-switch-network-backend bridge
This section describes the general concepts of networking in the XenServer environment.
XenServer creates a network for each physical NIC during installation. When you add a host to a pool,
the default networks are merged. This is to ensure all physical NICs with the same device name are
attached to the same network.
Typically, you add a network to create an internal network, set up a new VLAN using an existing NIC,
or create a NIC bond.
• External networks have an association with a physical network interface. External networks
provide a bridge between a virtual machine and the physical network interface connected to the
network. External networks enable a virtual machine to connect to resources available through
the host’s physical NIC.
• Bonded networks create a bond between two or more NICs to create a single, high‑performing
channel between the virtual machine and the network.
Note:
Some networking options have different behaviors when used with standalone XenServer hosts
compared to resource pools. This section contains sections on general information that applies
to both standalone hosts and pools, followed by specific information and procedures for each.
Network objects
This section uses three types of server‑side software objects to represent networking entities. These
objects are:
• A PIF, which represents a physical NIC on a host. PIF objects have a name and description, a
UUID, the parameters of the NIC they represent, and the network and host they are connected
to.
• A VIF, which represents a virtual NIC on a virtual machine. VIF objects have a name and descrip‑
tion, a UUID, and the network and VM they are connected to.
• A network, which is a virtual Ethernet switch on a host. Network objects have a name and de‑
scription, a UUID, and the collection of VIFs and PIFs connected to them.
XenCenter and the xe CLI allow you to configure networking options. You can control the NIC used for
management operations, and create advanced networking features such as VLANs and NIC bonds.
Networks
Each XenServer host has one or more networks, which are virtual Ethernet switches. Networks that
are not associated with a PIF are considered internal. Internal networks can be used to provide con‑
nectivity only between VMs on a given XenServer host, with no connection to the outside world. Net‑
works associated with a PIF are considered external. External networks provide a bridge between VIFs
and the PIF connected to the network, enabling connectivity to resources available through the PIF’s
NIC.
VLANs
VLANs, as defined by the IEEE 802.1Q standard, allow a single physical network to support multiple
logical networks. XenServer hosts support VLANs in multiple ways.
Note:
• We recommend not to use a GFS2 SR with a VLAN due to a known issue where you cannot
add or remove hosts on a clustered pool if the cluster network is on a non‑management
VLAN.
• All supported VLAN configurations are equally applicable to pools and standalone hosts,
and bonded and non‑bonded configurations.
Using VLANs with virtual machines Switch ports configured as 802.1Q VLAN trunk ports can be
used with the XenServer VLAN features to connect guest virtual network interfaces (VIFs) to specific
VLANs. In this case, the XenServer host performs the VLAN tagging/untagging functions for the guest,
which is unaware of any VLAN configuration.
XenServer VLANs are represented by additional PIF objects representing VLAN interfaces correspond‑
ing to a specified VLAN tag. You can connect XenServer networks to the PIF representing the physical
NIC to see all traffic on the NIC. Alternatively, connect networks to a PIF representing a VLAN to see
only the traffic with the specified VLAN tag. You can also connect a network such that it only sees the
native VLAN traffic, by attaching it to VLAN 0.
For procedures on how to create VLANs for XenServer hosts, either standalone or part of a resource
pool, see Creating VLANs.
If you want the guest to perform the VLAN tagging and untagging functions, the guest must be aware of
the VLANs. When configuring the network for your VMs, configure the switch ports as VLAN trunk ports,
but do not create VLANs for the XenServer host. Instead, use VIFs on a normal, non‑VLAN network.
Using VLANs with management interfaces Management interface can be configured on a VLAN
using a switch port configured as trunk port or access mode port. Use XenCenter or xe CLI to set up a
VLAN and make it the management interface. For more information, see Management interface.
Using VLANs with dedicated storage NICs Dedicated storage NICs can be configured to use native
VLAN or access mode ports as described in the previous section for management interfaces. Dedicated
storage NICs are also known as IP‑enabled NICs or secondary interfaces. You can configure dedicated
storage NICs to use trunk ports and XenServer VLANs as described in the previous section for virtual
machines. For more information, see Configuring a dedicated storage NIC.
Combining management interfaces and guest VLANs on a single host NIC A single switch port
can be configured with both trunk and native VLANs, allowing one host NIC to be used for a manage‑
ment interface (on the native VLAN) and for connecting guest VIFs to specific VLAN IDs.
Jumbo frames
Jumbo frames can be used to optimize the performance of traffic on storage networks and VM net‑
works. Jumbo frames are Ethernet frames containing more than 1,500 bytes of payload. Jumbo
frames are typically used to achieve better throughput, reduce the load on system bus memory, and
reduce the CPU overhead.
Note:
XenServer supports jumbo frames only when using vSwitch as the network stack on all hosts in
the pool.
Requirements for using jumbo frames Note the following when using jumbo frames:
• vSwitch must be configured as the network back‑end on all hosts in the pool
To use jumbo frames, set the Maximum Transmission Unit (MTU) to a value between 1500 and 9216.
You can use XenCenter or the xe CLI to set the MTU.
NIC Bonds
NIC bonds, sometimes also known as NIC teaming, improve XenServer host resiliency and bandwidth
by enabling administrators to configure two or more NICs together. NIC bonds logically function as
one network card and all bonded NICs share a MAC address.
If one NIC in the bond fails, the host’s network traffic is automatically redirected through the second
NIC. XenServer supports up to eight bonded networks.
XenServer supports active‑active, active‑passive, and LACP bonding modes. The number of NICs sup‑
ported and the bonding mode supported varies according to network stack:
• LACP bonding is only available for the vSwitch whereas active‑active and active‑passive are
available for both the vSwitch and the Linux bridge.
• When the vSwitch is the network stack, you can bond either two, three, or four NICs.
• When the Linux bridge is the network stack, you can only bond two NICs.
All bonding modes support failover. However, not all modes allow all links to be active for all traffic
types. XenServer supports bonding the following types of NICs together:
• NICs (non‑management). You can bond NICs that XenServer is using solely for VM traffic. Bond‑
ing these NICs not only provides resiliency, but doing so also balances the traffic from multiple
VMs between the NICs.
• Management interfaces. You can bond a management interface to another NIC so that the sec‑
ond NIC provides failover for management traffic. Although configuring an LACP link aggrega‑
tion bond provides load balancing for management traffic, active‑active NIC bonding does not.
You can create a VLAN on bonded NICs and the host management interface can be assigned to
that VLAN.
• Secondary interfaces. You can bond NICs that you have configured as secondary interfaces (for
example, for storage). However, for most iSCSI software initiator storage, we recommend con‑
figuring multipathing instead of NIC bonding as described in the Designing XenServer Network
Configurations.
Throughout this section, the term IP‑based storage traffic is used to describe iSCSI and NFS traf‑
fic collectively.
You can create a bond if a VIF is already using one of the interfaces that will be bonded: the VM traffic
migrates automatically to the new bonded interface.
In XenServer, An additional PIF represents a NIC bond. XenServer NIC bonds completely subsume the
underlying physical devices (PIFs).
Notes:
Best practices
• Connect the links of the bond to different physical network switches, not just ports on the same
switch.
• Ensure that the separate switches draw power from different, independent power distribution
units (PDUs).
• If possible, in your data center, place the PDUs on different phases of the power feed or even
feeds provided by different utility companies.
• Consider using uninterruptible power supply units to ensure that the network switches and
hosts can continue to function or perform an orderly shutdown in the event of a power failure.
These measures add resiliency against software, hardware, or power failures that can affect your net‑
work switches.
– When bonds are used for non‑VM traffic, for example, to connect to shared network storage
or XenCenter for management, configure an IP address for the bond. However, if you have
already assigned an IP address to one of the NICs (that is, created a management interface
or secondary interface), that IP address is assigned to the entire bond automatically.
– If you bond a tagged VLAN management interface and a secondary interface, the manage‑
ment VLAN is created on that bonded NIC.
• VM networks. When bonded NICs are used for VM traffic, you do not need to configure an IP
address for the bond. This is because the bond operates at Layer 2 of the OSI model, the data link
layer, and no IP addressing is used at this layer. IP addresses for virtual machines are associated
with VIFs.
Bonding types
XenServer provides three different types of bonds, all of which can be configured using either the CLI
or XenCenter:
• Active‑Active mode, with VM traffic balanced between the bonded NICs. See Active‑active bond‑
ing.
• Active‑Passive mode, where only one NIC actively carries traffic. See Active‑passive bonding.
• LACP Link Aggregation, in which active and stand‑by NICs are negotiated between the switch
and the host. See LACP Link Aggregation Control Protocol bonding.
Note:
Bonding is set up with an Up Delay of 31,000 ms and a Down Delay of 200 ms. The seemingly
long Up Delay is deliberate because of the time some switches take to enable the port. Without
a delay, when a link comes back after failing, the bond can rebalance traffic onto it before the
switch is ready to pass traffic. To move both connections to a different switch, move one, then
wait 31 seconds for it to be used again before moving the other. For information about changing
the delay, see Changing the up delay for bonds.
Bond status
XenServer provides status for bonds in the event logs for each host. If one or more links in a bond fails
or is restored, it is noted in the event log. Likewise, you can query the status of a bond’s links by using
the links-up parameter as shown in the following example:
XenServer checks the status of links in bonds approximately every five seconds. Therefore, if more
links in the bond fail in the five‑second window, the failure is not logged until the next status check.
Bonding event logs appear in the XenCenter Logs tab. For users not running XenCenter, event logs
also appear in /var/log/xensource.log on each host.
Active‑active bonding
Active‑active is an active/active configuration for guest traffic: both NICs can route VM traffic simulta‑
neously. When bonds are used for management traffic, only one NIC in the bond can route traffic: the
other NIC remains unused and provides failover support. Active‑active mode is the default bonding
mode when either the Linux bridge or vSwitch network stack is enabled.
When active‑active bonding is used with the Linux bridge, you can only bond two NICs. When using
the vSwitch as the network stack, you can bond either two, three, or four NICs in active‑active mode.
However, in active‑active mode, bonding three, or four NICs is only beneficial for VM traffic, as shown
in the illustration that follows.
XenServer can only send traffic over two or more NICs when there is more than one MAC address
associated with the bond. XenServer can use the virtual MAC addresses in the VIF to send traffic across
multiple links. Specifically:
• VM traffic. Provided you enable bonding on NICs carrying only VM (guest) traffic, all links are
active and NIC bonding can balance spread VM traffic across NICs. An individual VIF’s traffic is
never split between NICs.
• Management or storage traffic. Only one of the links (NICs) in the bond is active and the other
NICs remain unused unless traffic fails over to them. Configuring a management interface or
secondary interface on a bonded network provides resilience.
• Mixed traffic. If the bonded NIC carries a mixture of IP‑based storage traffic and guest traffic,
only the guest and control domain traffic are load balanced. The control domain is essentially
a virtual machine so it uses a NIC like the other guests. XenServer balances the control domain’
s traffic the same way as it balances VM traffic.
Traffic balancing XenServer balances the traffic between NICs by using the source MAC address of
the packet. Because for management traffic, only one source MAC address is present, active‑active
mode can only use one NIC, and traffic is not balanced. Traffic balancing is based on two factors:
• The virtual machine and its associated VIF sending or receiving the traffic
XenServer evaluates the quantity of data (in kilobytes) each NIC is sending and receiving. If the quan‑
tity of data sent across one NIC exceeds the quantity of data sent across the other NIC, XenServer
rebalances which VIFs use which NICs. The VIF’s entire load is transferred. One VIF’s load is never
split between two NICs.
Though active‑active NIC bonding can provide load balancing for traffic from multiple VMs, it cannot
provide a single VM with the throughput of two NICs. Any given VIF only uses one of the links in a bond
at a time. As XenServer periodically rebalances traffic, VIFs are not permanently assigned to a specific
NIC in the bond.
Active‑active mode is sometimes described as Source Load Balancing (SLB) bonding as XenServer
uses SLB to share load across bonded network interfaces. SLB is derived from the open‑source Adap‑
tive Load Balancing (ALB) mode and reuses the ALB functionality to rebalance load across NICs dy‑
namically.
When rebalancing, the number of bytes going over each secondary (interface) is tracked over a given
period. If a packet to be sent contains a new source MAC address, it is assigned to the secondary
interface with the lowest utilization. Traffic is rebalanced at regular intervals.
Each MAC address has a corresponding load and XenServer can shift entire loads between NICs de‑
pending on the quantity of data a VM sends and receives. For active‑active traffic, all the traffic from
one VM can be sent on only one NIC.
Note:
Active‑active bonding does not require switch support for EtherChannel or 802.3ad (LACP).
Active‑passive bonding
An active‑passive bond routes traffic over only one of the NICs. If the active NIC loses network connec‑
tivity, traffic fails over to the other NIC in the bond. Active‑passive bonds route traffic over the active
NIC. The traffic shifts to the passive NIC if the active NIC fails.
Active‑passive bonding is available in the Linux bridge and the vSwitch network stack. When used
with the Linux bridge, you can bond two NICs together. When used with the vSwitch, you can only
bond two, three, or four NICs together. However, regardless of the traffic type, when you bond NICs
in active‑passive mode, only one link is active and there is no load balancing between links.
The illustration that follows shows two bonded NICs configured in active‑passive mode.
Active‑active mode is the default bonding configuration in XenServer. If you are configuring bonds
using the CLI, you must specify a parameter for the active‑passive mode. Otherwise, an active‑active
bond is created. You do not need to configure active‑passive mode because a network is carrying
management traffic or storage traffic.
Active‑passive can be a good choice for resiliency as it offers several benefits. With active‑passive
bonds, traffic does not move around between NICs. Similarly, active‑passive bonding lets you con‑
figure two switches for redundancy but does not require stacking. If the management switch dies,
stacked switches can be a single point of failure.
Active‑passive mode does not require switch support for EtherChannel or 802.3ad (LACP).
Consider configuring active‑passive mode in situations when you do not need load balancing or when
you only intend to send traffic on one NIC.
Important:
After you have created VIFs or your pool is in production, be careful about changing bonds or
creating bonds.
LACP Link Aggregation Control Protocol is a type of bonding that bundles a group of ports together
and treats it like a single logical channel. LACP bonding provides failover and can increase the total
amount of bandwidth available.
Unlike other bonding modes, LACP bonding requires configuring both sides of the links: creating a
bond on the host, and creating a Link Aggregation Group (LAG) for each bond on the switch. See
Switch configuration for LACP bonds. You must configure the vSwitch as the network stack to use
LACP bonding. Also, your switches must support the IEEE 802.3ad standard.
Considerations:
Considerations:
Traffic balancing XenServer supports two LACP bonding hashing types. The term hashing de‑
scribes how the NICs and the switch distribute the traffic—(1) load balancing based on IP and port of
source and destination addresses and (2) load balancing based on source MAC address.
Depending on the hashing type and traffic pattern, LACP bonding can potentially distribute traffic
more evenly than active‑active NIC bonding.
Note:
You configure settings for outgoing and incoming traffic separately on the host and the switch:
the configuration does not have to match on both sides.
This hashing type is the default LACP bonding hashing algorithm. If there is a variation in the source
or destination IP or port numbers, traffic from one guest can be distributed over two links.
If a virtual machine is running several applications which use different IP or port numbers, this hashing
type distributes traffic over several links. Distributing the traffic gives the guest the possibility of using
the aggregate throughput. This hashing type lets one guest use the whole throughput of multiple
NICs.
As shown in the illustration that follows, this hashing type can distribute the traffic of two different
applications on a virtual machine to two different NICs.
Configuring LACP bonding based on IP and port of source and destination address is beneficial when
you want to balance the traffic of two different applications on the same VM. For example, when only
one virtual machine is configured to use a bond of three NICs.
The balancing algorithm for this hashing type uses five factors to spread traffic across the NICs: the
source IP address, source port number, destination IP address, destination port number, and source
MAC address.
This type of load balancing works well when there are multiple virtual machines on the same host.
Traffic is balanced based on the virtual MAC address of the VM from which the traffic originated.
XenServer sends outgoing traffic using the same algorithm as it does in active‑active bonding. Traffic
coming from the same guest is not split over multiple NICs. As a result, this hashing type is not
suitable if there are fewer VIFs than NICs: load balancing is not optimal because the traffic cannot be
split across NICs.
Switch configuration
Depending on your redundancy requirements, you can connect the NICs in the bond to either the
same or separate stacked switches. If you connect one of the NICs to a second, redundant switch
and a NIC or switch fails, traffic fails over to the other NIC. Adding a second switch prevents a single
point‑of‑failure in your configuration in the following ways:
• When you connect one of the links in a bonded management interface to a second switch, if the
switch fails, the management network remains online and the hosts can still communicate with
each other.
• If you connect a link (for any traffic type) to a second switch and the NIC or switch fails, the
virtual machines remain on the network as their traffic fails over to the other NIC/switch.
Use stacked switches when you want to connect bonded NICs to multiple switches and you config‑
ured the LACP bonding mode. The term ‘stacked switches’is used to describe configuring multiple
physical switches to function as a single logical switch. You must join the switches together physically
and through the switch‑management software so the switches function as a single logical switching
unit, as per the switch manufacturer’s guidelines. Typically, switch stacking is only available through
proprietary extensions and switch vendors may market this functionality under different terms.
Note:
If you experience issues with active‑active bonds, the use of stacked switches may be necessary.
Active‑passive bonds do not require stacked switches.
Switch configuration for LACP bonds Because the specific details of switch configuration vary by
manufacturer, there are a few key points to remember when configuring switches for use with LACP
bonds:
• The switch must support LACP and the IEEE 802.3ad standard.
• When you create the LAG group on the switch, you must create one LAG group for each LACP
bond on the host. For example, if you have a five‑host pool and you created an LACP bond on
NICs 4 and 5 on each host, you must create five LAG groups on the switch. One group for each
set of ports corresponding with the NICs on the host.
You may also need to add your VLAN ID to your LAG group.
• XenServer LACP bonds require setting the Static Mode setting in the LAG group to be set to Dis‑
abled.
As previously mentioned in Switch configuration, stacking switches are required to connect LACP
bonds to multiple switches.
The XenServer host networking configuration is specified during initial host installation. Options such
as IP address configuration (DHCP/static), the NIC used as the management interface, and host name
are set based on the values provided during installation.
When a host has multiple NICs, the configuration present after installation depends on which NIC is
selected for management operations during installation:
• The PIF of the NIC selected for use as the management interface is configured with the IP ad‑
dressing options specified during installation
• A network is created for each PIF (“network 0”, “network 1”, and so on)
• The IP addressing options are left unconfigured for all PIFs other than the PIF used as the man‑
agement interface
When a host has a single NIC, the following configuration is present after installation:
• The PIF is configured with the IP addressing options specified during installation and to enable
management of the host
When an installation of XenServer is done on a tagged VLAN network, the following configuration is
present after installation:
• The PIF for the tagged VLAN on the NIC selected for use as the management interface is config‑
ured with the IP address configuration specified during installation
• A network is created for each PIF (for example: network 1, network 2, and so on). Addi‑
tional VLAN network is created (for example, for Pool‑wide network associated with eth0 on
VLAN<TAG>)
• Each network is connected to one PIF. The VLAN PIF is set for use in host management opera‑
tions
In both cases, the resulting networking configuration allows connection to the XenServer host by Xen‑
Center, the xe CLI, and any other management software running on separate machines through the IP
address of the management interface. The configuration also provides external networking for VMs
created on the host.
The PIF used for management operations is the only PIF ever configured with an IP address during
XenServer installation. External networking for VMs is achieved by bridging PIFs to VIFs using the net‑
work object which acts as a virtual Ethernet switch.
The steps required for networking features such as VLANs, NIC bonds, and dedicating a NIC to storage
traffic are covered in the sections that follow.
You can change your networking configuration by modifying the network object. To do so, you run a
command that affects either the network object or the VIF.
You can change aspects of a network, such as the frame size (MTU), name‑label, name‑description,
purpose, and other values. Use the xe network-param-set command and its associated parame‑
ters to change the values.
When you run the xe network-param-set command, the only required parameter is uuid.
• name-label
• name-description
• MTU
• other-config
If a value for a parameter is not given, the parameter is set to a null value. To set a (key, value) pair in
a map parameter, use the syntax map-param:key=value.
Bonding is set up with an Up Delay of 31,000 ms by default to prevent traffic from being rebalanced
onto a NIC after it fails. While seemingly long, the up delay is important for all bonding modes and not
just active‑active.
However, if you understand the appropriate settings to select for your environment, you can change
the up delay for bonds by using the procedure that follows.
To make the change take effect, you must unplug and then replug the physical interface:
Manage networking
Network configuration procedures in this section differ depending on whether you are configuring a
stand‑alone host or a host that is part of a resource pool.
Because external networks are created for each PIF during host installation, creating extra networks
is typically only required to:
For information about how to add or delete networks using XenCenter, see Add a New Network in the
XenCenter documentation.
Create the network by using the network‑create command, which returns the UUID of the newly cre‑
ated network:
1 xe network-create name-label=mynetwork
At this point, the network is not connected to a PIF and therefore is internal.
All XenServer hosts in a resource pool must have the same number of physical NICs. This requirement
is not strictly enforced when a host is joined to a pool. One of the NICs is always designated as the
management interface, used for XenServer management traffic.
As all hosts in a pool share a common set of network. It is important to have the same physical net‑
working configuration for XenServer hosts in a pool. PIFs on the individual hosts are connected to
pool‑wide networks based on device name. For example, all XenServer hosts in a pool with eth0 NIC
have a corresponding PIF plugged to the pool‑wide Network 0 network. The same is true for hosts
with eth1 NICs and Network 1, and other NICs present in at least one XenServer host in the pool.
If one XenServer host has a different number of NICs than other hosts in the pool, complications can
arise. The complications can arise because not all pool networks are valid for all pool hosts. For ex‑
ample, if hosts host1 and host2 are in the same pool and host1 has four NICs and host2 only has two,
only the networks connected to PIFs corresponding to eth0 and eth1 are valid on host2. VMs on host1
with VIFs connected to networks corresponding to eth2 and eth3 cannot migrate to host host2.
Create VLANs
For hosts in a resource pool, you can use the pool-vlan-create command. This command cre‑
ates the VLAN and automatically creates and plug‑ins the required PIFs on the hosts in the pool. For
more information, see pool-vlan-create.
Create a network for use with the VLAN. The UUID of the new network is returned:
1 xe network-create name-label=network5
Use the pif-list command to find the UUID of the PIF corresponding to the physical NIC supporting
the desired VLAN tag. The UUIDs and device names of all PIFs are returned, including any existing
VLANs:
1 xe pif-list
Create a VLAN object specifying the desired physical PIF and VLAN tag on all VMs to be connected to
the new VLAN. A new PIF is created and plugged to the specified network. The UUID of the new PIF
object is returned.
Attach VM VIFs to the new network. For more information, see Creating networks in a standalone
host.
We recommend using XenCenter to create NIC bonds. For more information, see Configuring NICs.
This section describes how to use the xe CLI to bond NIC interfaces on XenServer hosts that are not in
a pool. For information on using the xe CLI to create NIC bonds on XenServer hosts that comprise a
resource pool, see Creating NIC bonds in resource pools.
When you bond a NIC, the bond absorbs the PIF/NIC in use as the management interface. The man‑
agement interface is automatically moved to the bond PIF.
1. Use the network-create command to create a network for use with the bonded NIC. The
UUID of the new network is returned:
1 xe network-create name-label=bond0
2. Use the pif-list command to determine the UUIDs of the PIFs to use in the bond:
1 xe pif-list
• To configure the bond in active‑active mode (default), use the bond-create command
to create the bond. Using commas to separate the parameters, specify the newly created
network UUID and the UUIDs of the PIFs to be bonded:
1 xe bond-create network-uuid=network_uuid /
2 pif-uuids=pif_uuid_1,pif_uuid_2,pif_uuid_3,pif_uuid_4
Type two UUIDs when you are bonding two NICs and four UUIDs when you are bonding
four NICs. The UUID for the bond is returned after running the command.
• To configure the bond in active‑passive or LACP bond mode, use the same syntax, add the
optional mode parameter, and specify lacp or active-backup:
When you bond the management interface, it subsumes the PIF/NIC in use as the management inter‑
face. If the host uses DHCP, the bond’s MAC address is the same as the PIF/NIC in use. The manage‑
ment interface’s IP address can remain unchanged.
You can change the bond’s MAC address so that it is different from the MAC address for the (current)
management‑interface NIC. However, as the bond is enabled and the MAC/IP address in use changes,
existing network sessions to the host are dropped.
You can control the MAC address for a bond in two ways:
• An optional mac parameter can be specified in the bond-create command. You can use this
parameter to set the bond MAC address to any arbitrary address.
• If the mac parameter is not specified, XenServer uses the MAC address of the management inter‑
face if it is one of the interfaces in the bond. If the management interface is not part of the bond,
but another management interface is, the bond uses the MAC address (and also the IP address)
of that management interface. If none of the NICs in the bond is a management interface, the
bond uses the MAC of the first named NIC.
When reverting the XenServer host to a non‑bonded configuration, the bond-destroy command
automatically configures the primary NIC as the interface for the management interface. Therefore,
all VIFs are moved to the management interface. If management interface of a host is on tagged VLAN
bonded interface, on performing bond-destroy, management VLAN is moved to primary NIC.
The term primary NIC refers to the PIF that the MAC and IP configuration was copied from when creat‑
ing the bond. When bonding two NICs, the primary NIC is:
1. The management interface NIC (if the management interface is one of the bonded NICs).
2. Any other NIC with an IP address (if the management interface was not part of the bond).
3. The first named NIC. You can find out which one it is by running the following:
1 xe bond-list params=all
Whenever possible, create NIC bonds as part of initial resource pool creation, before joining more
hosts to the pool or creating VMs. Doing so allows the bond configuration to be automatically repli‑
cated to hosts as they are joined to the pool and reduces the number of steps required.
• Using the CLI to configure the bonds on the pool coordinator and then each member of the pool.
• Using the CLI to configure bonds on the pool coordinator and then restarting each pool member
so that it inherits its settings from the pool coordinator.
• Using XenCenter to configure the bonds on the pool coordinator. XenCenter automatically syn‑
chronizes the networking settings on the member hosts with the pool coordinator, so you do
not need to restart the member hosts.
For simplicity and to prevent misconfiguration, we recommend using XenCenter to create NIC bonds.
For more information, see Configuring NICs.
This section describes using the xe CLI to create bonded NIC interfaces on XenServer hosts that com‑
prise a resource pool. For information on using the xe CLI to create NIC bonds on a standalone host,
see Creating NIC bonds on a standalone host.
Warning:
Do not attempt to create network bonds when high availability is enabled. The process of bond
creation disturbs the in‑progress high availability heartbeat and causes hosts to self‑fence (shut
themselves down). The hosts can fail to restart properly and may need the host-emergency
-ha-disable command to recover.
Select the host you want to be the pool coordinator. The pool coordinator belongs to an unnamed
pool by default. To create a resource pool with the CLI, rename the existing nameless pool:
Open a console on a host that you want to join to the pool and run the command:
The network and bond information is automatically replicated to the new host. The management
interface is automatically moved from the host NIC where it was originally configured to the bonded
PIF. That is, the management interface is now absorbed into the bond so that the entire bond functions
as the management interface.
Use the host-list command to find the UUID of the host being configured:
1 xe host-list
Warning:
Do not attempt to create network bonds while high availability is enabled. The process of bond
creation disturbs the in‑progress high availability heartbeat and causes hosts to self‑fence (shut
themselves down). The hosts can fail to restart properly and you may need to run the host-
emergency-ha-disable command to recover.
You can use XenCenter or the xe CLI to assign a NIC an IP address and dedicate it to a specific function,
such as storage traffic. When you configure a NIC with an IP address, you do so by creating a sec‑
ondary interface. (The IP‑enabled NIC XenServer used for management is known as the management
interface.)
When you want to dedicate a secondary interface for a specific purpose, ensure that the appropriate
network configuration is in place. This is to ensure that the NIC is used only for the desired traffic.
To dedicate a NIC to storage traffic, configure the NIC, storage target, switch, and VLAN such that the
target is only accessible over the assigned NIC. If your physical and IP configuration does not limit
the traffic sent across the storage NIC, you can send traffic, such as management traffic across the
secondary interface.
When you create a new secondary interface for storage traffic, you must assign it an IP address that
is:
• Not on the same subnet as any other secondary interfaces or the management interface.
When you are configuring secondary interfaces, each secondary interface must be on a separate sub‑
net. For example, if you want to configure two more secondary interfaces for storage, you require
IP addresses on three different subnets –one subnet for the management interface, one subnet for
Secondary Interface 1, and one subnet for Secondary Interface 2.
If you are using bonding for resiliency for your storage traffic, you may want to consider using LACP
instead of the Linux bridge bonding. To use LACP bonding, you must configure the vSwitch as your
networking stack. For more information, see vSwitch networks.
Note:
When selecting a NIC to configure as a secondary interface for use with iSCSI or NFS SRs, ensure
that the dedicated NIC uses a separate IP subnet that is not routable from the management in‑
terface. If this is not enforced, then storage traffic may be directed over the main management
interface after a host restart, because of the order in which network interfaces are initialized.
Ensure that the PIF is on a separate subnet, or routing is configured to suit your network topology to
force desired traffic over the selected PIF.
Set up an IP configuration for the PIF, adding appropriate values for the mode parameter. If using
static IP addressing, add the IP, netmask, gateway, and DNS parameters:
If you want to use a secondary interface for storage that can be routed from the management interface
also (bearing in mind that this configuration is not the best practice), you have two options:
• After a host restart, ensure that the secondary interface is correctly configured. Use the xe
pbd-unplug and xe pbd-plug commands to reinitialize the storage connections on the
host. This command restarts the storage connection and routes it over the correct interface.
• Alternatively, you can use xe pif-forget to delete the interface from the XenServer data‑
base and manually configure it in the control domain. xe pif-forget is an advanced option
and requires you to be familiar with how to configure Linux networking manually.
Single Root I/O Virtualization (SR‑IOV) is a virtualization technology that allows a single PCI device
to appear as multiple PCI devices on the physical system. The actual physical device is known as a
Physical Function (PF) while the others are known as Virtual Functions (VF). The hypervisor can assign
one or more VFs to a Virtual Machine (VM): the guest can then use the device as if it were directly
assigned.
Assigning one or more NIC VFs to a VM allows its network traffic to bypass the virtual switch. When
configured, each VM behaves as though it is using the NIC directly, reducing processing overhead, and
improving performance.
Benefits of SR‑IOV
An SR‑IOV VF has a better performance than VIF. It can ensure the hardware‑based segregation be‑
tween traffic from different VMs through the same NIC (bypassing the XenServer network stack).
• Run tests to confirm if SR‑IOV is supported as part of the Automated Certification Kit.
System configuration
Configure the hardware platform correctly to support SR‑IOV. The following technologies are
required:
Check the documentation that comes with your system for information on how to configure the sys‑
tem firmware to enable the mentioned technologies.
In XenCenter, use the New Network wizard in the Networking tab to create and enable an SR‑IOV
network on a NIC.
In XenCenter, at the VM level, use the Add Virtual Interface wizard in the Networking tab to add
an SR‑IOV enabled network as a virtual interface for that VM. For more information, see Add a New
Network.
For a list of supported hardware platforms and NICs, see Hardware Compatibility List. See the docu‑
mentation provided by the vendor for a particular guest to determine whether it supports SR‑IOV.
Limitations
• For certain NICs using legacy drivers (for example, Intel I350 family) the host must be rebooted
to enable or disable SR‑IOV on these devices.
• A pool level SR‑IOV network having different types of NICs are not supported.
• An SR‑IOV VF and a normal VIF from the same NIC may not be able to communicate with each
other because of the NIC hardware limitations. To enable these VMs to communicate, ensure
that communication uses the pattern VF to VF or VIF to VIF, and not VF to VIF.
• Quality of Service settings for some SR‑IOV VFs do not take effect because they do not support
network speed rate limiting.
• Performing live migration, suspend, and checkpoint is not supported on VMs using an SR‑IOV
VF.
• For some NICs with legacy NIC drivers, rebooting may be required even after host restart which
indicates that the NIC is not able to enable SR‑IOV.
• If your VM has an SR‑IOV VF, functions that require Live Migration are not possible. This is be‑
cause the VM is directly tied to the physical SR‑IOV enabled NIC VF.
• SR‑IOV can be used in an environment that makes use of high availability. However, SR‑IOV is not
considered in the capacity planning. VMs that have SR‑IOV VFs assigned are restarted on a best‑
effort basis when there is a host in the pool that has appropriate resources. These resources
include SR‑IOV enabled on the right network and a free VF.
• SR‑IOV VFs are not supported with the PVS‑Accelerator.
Usually the maximum number of VFs that a NIC can support can be determined automatically. For
NICs using legacy drivers (for example, Intel I350 family), the limit is defined within the driver module
configuration file. The limit may need to be adjusted manually. To set it to the maximum, open the
file using an editor and change the line starting:
1 ## VFs-maxvfs-by-user:
For example, to set the maximum VFs to 4 for the igb driver edit /etc/modprobe.d/igb.conf
to read:
1 ## VFs-param: max_vfs
2 ## VFs-maxvfs-by-default: 7
3 ## VFs-maxvfs-by-user: 4
4 options igb max_vfs=0
Notes:
• The value must be less than or equal to the value in the line VFs-maxvfs-by-default.
CLI
See SR‑IOV commands for CLI instructions on creating, deleting, displaying SR‑IOV networks and as‑
signing an SR‑IOV VF to a VM.
To limit the amount of outgoing data a VM can send per second, set an optional Quality of Service
(QoS) value on VM virtual interfaces (VIFs). The setting lets you specify a maximum transmit rate for
outgoing packets in kilobytes per second.
The Quality of Service value limits the rate of transmission from the VM. The Quality of Service setting
does not limit the amount of data the VM can receive. If such a limit is desired, we recommend limiting
the rate of incoming packets higher up in the network (for example, at the switch level).
Depending on networking stack configured in the pool, you can set the Quality of Service value on
VM virtual interfaces (VIFs) in one of two places. You can set this value either by using the xe CLI or in
XenCenter.
• XenCenter You can set the Quality of Service transmit rate limit value in the properties dialog
for the virtual interface.
• xe commands You can set the Quality of Service transmit rate using the CLI using the commands
in the section that follow.
To limit a VIF to a maximum transmit rate of 100 kilobytes per second using the CLI, use the vif-
param-set command:
Note:
The kbps parameter denotes kilobytes per second (kBps), not kilobits per second (kbps).
This section discusses how to change the networking configuration of your XenServer host. It in‑
cludes:
• Changing the hostname (that is, the Domain Name System (DNS) name)
• Changing IP addresses
Hostname
The system hostname, also known as the domain or DNS name, is defined in the pool‑wide database
and changed using the xe host-set-hostname-live CLI command as follows:
The underlying control domain hostname changes dynamically to reflect the new hostname.
DNS servers
To add or delete DNS servers in the IP addressing configuration of the XenServer host, use the pif-
reconfigure-ip command. For example, for a PIF with a static IP:
You can use the xe CLI to change the network interface configuration. Do not change the underlying
network configuration scripts directly.
To change the IP address configuration of a PIF, use the pif-reconfigure-ip CLI command. See
pif-reconfigure-ip for details on the parameters of the pif-reconfigure-ip command.
See the following section for information on changing host IP addresses in resource pools.
XenServer hosts in resource pools have a single management IP address used for management and
communication to and from other hosts in the pool. The steps required to change the IP address of a
host’s management interface are different for pool coordinator and other hosts.
Note:
You must be careful when changing the IP address of a host, and other networking parameters.
Depending upon the network topology and the change being made, connections to network stor‑
age can be lost. When this happens, the storage must be replugged using the Repair Storage
function in XenCenter, or by using the pbd-plug CLI command. For this reason, we recom‑
mend that you migrate VMs away from the host before changing its IP configuration.
Use the pif-reconfigure-ip CLI command to set the IP address as desired. See pif-
reconfigure-ip for details on the parameters of the pif-reconfigure-ip command.
:
Use the host-list CLI command to confirm that the member host has successfully reconnected to
the pool coordinator by checking that all the other XenServer hosts in the pool are visible:
1 xe host-list
Changing the IP address of the pool coordinator XenServer host requires extra steps. This is because
each pool member uses the advertised IP address of the pool coordinator for communication. The
pool members do not know how to contact the pool coordinator when its IP address changes.
Whenever possible, use a dedicated IP address that is not likely to change for the lifetime of the pool
for pool coordinators.
When the IP address of the pool coordinator changes, all member hosts enter into an emergency mode
when they fail to contact the pool coordinator.
On the pool coordinator, use the pool-recover-slaves command to force the pool coordinator
to contact each pool member and inform them of the new pool coordinator IP address:
1 xe pool-recover-slaves
Management interface
When you install XenServer on a host, one of its NICs is designated as the management interface: the
NIC used for XenServer management traffic. The management interface is used for XenCenter con‑
nections to the host (for example, Citrix Virtual Apps and Desktops) and for host‑to‑host communica‑
tion.
Use the pif-list command to determine which PIF corresponds to the NIC to be used as the man‑
agement interface. The UUID of each PIF is returned.
1 xe pif-list
Use the pif-param-list command to verify the IP addressing configuration for the PIF used for
the management interface. If necessary, use the pif-reconfigure-ip command to configure IP
addressing for the PIF to be used.
1 xe pif-param-list uuid=pif_uuid
Use the host-management-reconfigure CLI command to change the PIF used for the manage‑
ment interface. If this host is part of a resource pool, this command must be issued on the member host
console:
1 xe host-management-reconfigure pif-uuid=pif_uuid
Use the network-list command to determine which PIF corresponds to the NIC to be used as the
management interface for all the hosts in the pool. The UUID of pool wide network is returned.
1 xe network-list
Use the network-param-list command to fetch the PIF UUIDs of all the hosts in the pool. Use
the pif-param-list command to verify the IP addressing configuration for the PIF for the manage‑
ment interface. If necessary, use the pif-reconfigure-ip command to configure IP addressing
for the PIF to be used.
1 xe pif-param-list uuid=pif_uuid
Use the pool-management-reconfigure CLI command to change the PIF used for the manage‑
ment interface listed in the Networks list.
1 xe pool-management-reconfigure network-uuid=network_uuid
You can use either HTTPS over port 443 or HTTP over port 80 to communicate with XenServer. For
security reasons, you can close TCP port 80 on the management interface. By default, port 80 is still
open. If you close it, any external clients that use the management interface must use HTTPS over
port 443 to connect to XenServer. However, before closing port 80, check whether all your API clients
(Citrix Virtual Apps and Desktops in particular) can use HTTPS over port 443.
To close port 80, see the https-only xe CLI command or Change Pool Properties in the XenCenter
documentation.
To disable remote access to the management console entirely, use the host-management-
disable CLI command.
Warning:
When the management interface is disabled, you must log in on the physical host console to
perform management tasks. External interfaces such as XenCenter do not work when the man‑
agement interface is disabled.
1. Install a new physical NIC on your XenServer host in the usual manner.
3. List all the physical NICs for that XenServer host by using the following command:
1 xe pif-list host-uuid=<host_uuid>
4. If you do not see the additional NIC, scan for new physical interfaces by using the following
command:
1 xe pif-scan host-uuid=<host_uuid>
This command creates a new PIF object for the new NIC.
5. List the physical NICs on the XenServer host again to verify that the new NIC is visible:
1 xe pif-list host-uuid=<host_uuid>
1 xe pif-plug uuid=<uuid_of_pif>
Alternatively, you can use XenCenter to rescan for new NICs. For more information, see Configuring
NICs in the XenCenter documentation.
Before removing the NIC, ensure that you know the UUID of the corresponding PIF. Remove the phys‑
ical NIC from your XenServer host in the usual manner. After restarting the host, run the xe CLI com‑
mand pif-forget uuid=<UUID> to destroy the PIF object.
The network purpose can be used to add extra functionalities to a network. For example, the ability
to use the network to make NBD connections.
Currently, the available values for the network purpose are nbd and insecure_nbd. For more in‑
formation, see the XenServer Changed Block Tracking Guide.
The XenServer switch‑port locking feature lets you control traffic sent from unknown, untrusted, or
potentially hostile VMs by limiting their ability to pretend they have a MAC or IP address that was not
assigned to them. You can use the port‑locking commands to block all traffic on a network by default
or define specific IP addresses from which an individual VM is allowed to send traffic.
Switch‑port locking is a feature designed for public cloud‑service providers in environments con‑
cerned about internal threats. This functionality assists public cloud‑service providers who have a
network architecture in which each VM has a public, internet‑connected IP address. Because cloud
tenants are untrusted, you can use security measures such as spoofing protection to ensure that
tenants cannot attack other virtual machines in the cloud.
Using switch‑port locking lets you simplify your network configuration by enabling all of your tenants
or guests to use the same Layer 2 network.
One of the most important functions of the port‑locking commands is they can restrict the traffic that
an untrusted guest send. This restricts the guest’s ability to pretend it has a MAC or IP address it does
not actually possess. Specifically, you can use these commands to prevent a guest from:
• Claiming an IP or MAC address other than the ones the XenServer administrator has specified it
can use
Requirements
• The XenServer switch‑port locking feature is supported on the Linux bridge and vSwitch net‑
working stacks.
• When you enable Role Based Access Control (RBAC) in your environment, the user configuring
switch‑port locking must be logged in with an account that has at least a Pool Operator or Pool
Admin role. When RBAC is not enabled in your environment, the user must be logged in with
the root account for the pool coordinator.
• When you run the switch‑port locking commands, networks can be online or offline.
• In Windows guests, the disconnected Network icon only appears when XenServer VM Tools are
installed in the guest.
Notes Without any switch‑port locking configurations, VIFs are set to “network_default”and Net‑
works are set to “unlocked.”
Configuring switch‑port locking is not supported when any third‑party controllers are in use in the
environment.
• Receiving some traffic intended for other virtual machines through normal switch flooding be‑
haviors (for broadcast MAC addresses or unknown destination MAC addresses).
Likewise, switch‑port locking does not restrict where a VM can send traffic to.
Implementation notes You can implement the switch‑port locking functionality either by using the
command line or the XenServer API. However, in large environments, where automation is a primary
concern, the most typical implementation method might be by using the API.
Examples This section provides examples of how switch‑port locking can prevent certain types of
attacks. In these examples, VM‑c is a virtual machine that a hostile tenant (Tenant C) is leasing and
using for attacks. VM‑a and VM‑b are virtual machines leased by non‑attacking tenants.
Example 1: How switch port locking can prevent ARP spoofing prevention:
ARP spoofing is used to indicate an attacker’s attempts to associate their MAC address with the IP
address for another node. ARP spoofing can potentially result in the node’s traffic being sent to the
attacker instead. To achieve this goal the attacker sends fake (spoofed) ARP messages to an Ethernet
LAN.
Scenario:
Virtual Machine A (VM‑a) wants to send IP traffic from VM‑a to Virtual Machine B (VM‑b) by addressing
it to VM‑b’s IP address. The owner of Virtual Machine C wants to use ARP spoofing to pretend their VM,
VM‑c, is actually VM‑b.
1. VM‑c sends a speculative stream of ARP replies to VM‑a. The ARP replies claim that the MAC
address in the reply (c_MAC) is associated with the IP address, b_IP
Result: Because the administrator enabled switch‑port locking, these packets are all dropped
because enabling switch‑port locking prevents impersonation.
2. VM‑b sends an ARP reply to VM‑a, claiming that the MAC address in the reply (b_MAC) is associ‑
ated with the IP address, b_IP.
IP address spoofing is a process that conceals the identity of packets by creating Internet Protocol (IP)
packets with a forged source IP address.
Scenario:
Tenant C is attempting to perform a Denial of Service attack using their host, Host‑C, on a remote
system to disguise their identity.
Attempt 1:
Tenant C sets Host‑C’s IP address and MAC address to VM‑a’s IP and MAC addresses (a_IP and a_MAC).
Tenant C instructs Host‑C to send IP traffic to a remote system.
Result: The Host‑C packets are dropped. This is because the administrator enabled switch‑port
locking. The Host‑C packets are dropped because enabling switch‑port locking prevents imperson‑
ation.
Attempt 2:
Tenant C sets Host‑C’s IP address to VM‑a’s IP address (a_IP) and keeps their original c_MAC.
Result: The Host‑C packets are dropped. This is because the administrator enabled switch‑port lock‑
ing, which prevents impersonation.
Scenario:
One of her tenants, Tenant B, is hosting multiple websites from their VM, VM‑b. Each website needs a
distinct IP address hosted on the same virtual network interface (VIF).
Alice reconfigures Host‑B’s VIF to be locked to a single MAC but many IP addresses.
How switch‑port locking works The switch‑port locking feature lets you control packet filtering at
one or more of two levels:
• VIF level. Settings you configure on the VIF determine how packets are filtered. You can set the
VIF to prevent the VM from sending any traffic, restrict the VIF so it can only send traffic using its
assigned IP address, or allow the VM to send traffic to any IP address on the network connected
to the VIF.
• Network level. The XenServer network determines how packets are filtered. When a VIF’s lock‑
ing mode is set to network_default, it refers to the network‑level locking setting to deter‑
mine what traffic to allow.
Regardless of which networking stack you use, the feature operates the same way. However, as de‑
scribed in more detail in the sections that follow, the Linux bridge does not fully support switch‑port
locking in IPv6.
VIF locking‑mode states The XenServer switch‑port locking feature provides a locking mode that
lets you configure VIFs in four different states. These states only apply when the VIF is plugged into a
running virtual machine.
• Network_default. When the VIF’s state is set to network_default, XenServer uses the net‑
work’s default-locking-mode parameter to determine if and how to filter packets travel‑
ing through the VIF. The behavior varies according to if the associated network has the network
default locking mode parameter set to disabled or unlocked:
The default locking mode of the network has no effect on attached VIFs whose locking state is
anything other than network_default.
Note:
You cannot change the default-locking-mode of a network that has active VIFs at‑
tached to it.
• Locked. XenServer applies filtering rules so that only traffic sent to/from the specified MAC
and IP addresses is allowed to be sent out through the VIF. In this mode, if no IP addresses are
specified, the VM cannot send any traffic through that VIF, on that network.
To specify the IP addresses from which the VIF accepts traffic, use the IPv4 or IPv6 IP addresses
by using the ipv4_allowed or ipv6_allowed parameters. However, if you have the Linux
bridge configured, do not type IPv6 addresses.
XenServer lets you type IPv6 addresses when the Linux bridge is active. However, XenServer
cannot filter based on the IPv6 addresses typed. The reason is the Linux bridge does not have
modules to filter Neighbor Discovery Protocol (NDP) packets. Therefore, complete protection
cannot be implemented and guests would be able to impersonate another guest by forging
NDP packets. As result, if you specify even one IPv6 address, XenServer lets all IPv6 traffic pass
through the VIF. If you do not specify any IPv6 addresses, XenServer does not let any IPv6 traffic
pass through to the VIF.
• Unlocked. All network traffic can pass through the VIF. That is, no filters are applied to any traffic
going to or from the VIF.
• Disabled. No traffic is allowed to pass through the VIF. (That is, XenServer applies a filtering rule
so that the VIF drops all traffic.)
Configure switch port locking This section provides three different procedures:
• Add an IP address to an existing restricted list. For example, to add an IP address to a VIF when
the VM is running and connected to the network (for example, if you are taking a network offline
temporarily).
If a VIF’s locking‑mode is set to locked, it can only use the addresses specified in the ipv4-
allowed or ipv6-allowed parameters.
Because, in some relatively rare cases, VIFs may have more than one IP address, it is possible to specify
multiple IP addresses for a VIF.
You can perform these procedures before or after the VIF is plugged in (or the VM is started).
Change the default‑locking mode to locked, if it is not using that mode already, by running the follow‑
ing command:
The vif-uuid represents the UUID of the VIF you want to allow to send traffic. To obtain the UUID,
run the xe vif-list command on the host. vm-uuid Indicates the virtual machine for which the
information appears. The device ID indicates the device number of the VIF.
Run the vif-param-set command to specify the IP addresses from which the virtual machine can
send traffic. Do one or more of the following:
You can specify multiple IP addresses by separating them with a comma, as shown in the preceding
example.
After performing the procedure to restrict a VIF to using a specific IP address, you can add one or more
IP addresses the VIF can use.
Run the vif-param-add command to add the IP addresses to the existing list. Do one or more of
the following:
If you restrict a VIF to use two or more IP addresses, you can delete one of those IP addresses from the
list.
Run the vif-param-remove command to delete the IP addresses from the existing list. Do one or
more of the following:
Prevent a virtual machine from sending or receiving traffic from a specific network The fol‑
lowing procedure prevents a virtual machine from communicating through a specific VIF. As a VIF
connects to a specific XenServer network, you can use this procedure to prevent a virtual machine
from sending or receiving any traffic from a specific network. This provides a more granular level of
control than disabling an entire network.
If you use the CLI command, you do not need to unplug the VIF to set the VIF’s locking mode. The
command changes the filtering rules while the VIF is running. In this case, the network connection
still appears to be present, however, the VIF drops any packets the VM attempts to send.
Tip:
To find the UUID of a VIF, run the xe vif-list command on the host. The device ID indicates
the device number of the VIF.
To prevent a VIF from receiving traffic, disable the VIF connected to the network from which you want
to stop the VM from receiving traffic:
You can also disable the VIF in XenCenter by selecting the virtual network interface in the VM’s Net‑
working tab and clicking Deactivate.
Remove a VIF’s restriction to an IP address To revert to the default (original) locking mode state,
use the following procedure. By default, when you create a VIF, XenServer configures it so that it is not
restricted to using a specific IP address.
To revert a VIF to an unlocked state, change the VIF default‑locking mode to unlocked. If it is not using
that mode already, run the following command:
Simplify VIF locking mode configuration in the Cloud Rather than running the VIF locking mode
commands for each VIF, you can ensure all VIFs are disabled by default. To do so, you must change
the packet filtering at the network level. Changing the packet filtering causes the XenServer network
to determine how packets are filtered, as described in the previous section How switch‑port locking
works.
Specifically, a network’s default-locking-mode setting determines how new VIFs with default
settings behave. Whenever a VIF’s locking-mode is set to default, the VIF refers to the network‑
locking mode (default-locking-mode) to determine if and how to filter packets traveling
through the VIF:
By default, the default-locking-mode for all networks created in XenCenter and using the CLI
are set to unlocked.
By setting the VIF’s locking mode to its default (network_default), you can create a basic default
configuration (at the network level) for all newly created VIFs that connect to a specific network.
This illustration shows how, when a VIF’s locking-mode is set to its default setting (network_default
), the VIF uses the network default-locking-mode to determine its behavior.
For example, by default, VIFs are created with their locking-mode set to network_default. If
you set a network’s default-locking-mode=disabled, any new VIFs for which you have not
configured the locking mode are disabled. The VIFs remain disabled until you either (a) change the in‑
dividual VIF’s locking-mode parameter or (b) explicitly set the VIF’s locking-mode to ‘unlocked.
This is helpful when you trust a specific VM enough so you do not want to filter its traffic at all.
After creating the network, change the default‑locking mode by running the following command:
Note:
To get the UUID for a network, run the xe network-list command. This command displays
the UUIDs for all the networks on the host on which you ran the command.
OR
Use network settings for VIF traffic filtering The following procedure instructs a VIF on a virtual
machine to use the XenServer network default-locking-mode settings on the network itself to
determine how to filter traffic.
1. Change the VIF locking state to network_default, if it is not using that mode already, by
running the following command:
2. Change the default‑locking mode to unlocked, if it is not using that mode already, by running
the following command:
Troubleshoot networking
If you are experiencing problems with configuring networking, first ensure that you have not directly
changed any of the control domain ifcfg-* files. The control domain host agent manages the
ifcfg files directly, and any changes are overwritten.
Some network card models require firmware upgrades from the vendor to work reliably under load,
or when certain optimizations are turned on. If you see corrupted traffic to VMs, try to obtain the latest
firmware from your vendor and then use it to update your hardware.
If the problem still persists, then you can use the CLI to disable receive or transmit offload optimiza‑
tions on the physical interface.
Warning:
Disabling receive or transmit offload optimizations can result in a performance loss and
increased CPU usage.
First, determine the UUID of the physical interface. You can filter on the device field as follows:
1 xe pif-list device=eth0
Finally, replug the PIF or restart the host for the change to take effect.
Incorrect networking settings can cause loss of network connectivity. When there is no network con‑
nectivity, XenServer host can become inaccessible through XenCenter or remote SSH. Emergency Net‑
work Reset provides a simple mechanism to recover and reset a host’s networking.
The Emergency network reset feature is available from the CLI using the xe-reset-networking
command, and within the Network and Management Interface section of xsconsole.
Incorrect settings that cause a loss of network connectivity include renaming network interfaces, cre‑
ating bonds or VLANs, or mistakes when changing the management interface. For example, typing
the wrong IP address. You may also want to run this utility in the following scenarios:
• When a rolling pool upgrade, manual upgrade, hotfix installation, or driver installation causes
a lack of network connectivity, or
• If a pool coordinator or host in a resource pool is unable to contact with other hosts.
Use the xe-reset-networking utility only in an emergency because it deletes the configuration
for all PIFs, bonds, VLANs, and tunnels associated with the host. Guest Networks and VIFs are pre‑
served. As part of this utility, VMs are shut down forcefully. Before running this command, cleanly
shut down the VMs where possible. Before you apply a reset, you can change the management inter‑
face and specify which IP configuration, DHCP, or Static can be used.
If the pool coordinator requires a network reset, reset the network on the pool coordinator first before
applying a network reset on pool members. Apply the network reset on all remaining hosts in the
pool to ensure that the pool’s networking configuration is homogeneous. Network homogeneity is
an important factor for live migration.
Note:
If the pool coordinator’s IP address (the management interface) changes as a result of a network
reset or xe host-management-reconfigure, apply the network reset command to other
hosts in the pool. This is to ensure that the pool members can reconnect to the pool coordinator
on its new IP address. In this situation, the IP address of the pool coordinator must be specified.
Network reset is NOT supported when High Availability is enabled. To reset network configura‑
tion in this scenario, you must first manually disable high availability, and then run the network
reset command.
After you specify the configuration mode to be used after the network reset, xsconsole and the CLI
display settings that will be applied after host reboot. It is a final chance to modify before applying the
emergency network reset command. After restart, the new network configuration can be verified in
XenCenter and xsconsole. In XenCenter, with the host selected, select the Networking tab to see
the new network configuration. The Network and Management Interface section in xsconsole display
this information.
Note:
Run emergency network reset on other pool members to replicate bonds, VLANs, or tunnels from
the pool coordinator’s new configuration.
The following table shows the available optional parameters which can be used by running the xe-
reset-networking command.
Warning:
Users are responsible to ensure the validity of parameters for the xe-reset-networking
command, and to check the parameters carefully. If you specify invalid parameters, network
connectivity and configuration can be lost. In this situation, we advise that you rerun the com‑
mand xe-reset-networking without using any parameters.
Resetting the networking configuration of a whole pool must begin on the pool coordinator, fol‑
lowed by network reset on all remaining hosts in the pool.
Pool cooordinator command‑line examples Examples of commands that can be applied on a pool
coordinator:
1 xe-reset-networking
To reset networking for DHCP configuration if another interface became the management interface
after initial setup:
1 xe-reset-networking --device=device-name
To reset networking for Static IP configuration if another interface became the management interface
after initial setup:
Note:
The reset-network command can also be used along with the IP configuration settings.
Pool member command‑line examples All previous examples also apply to pool members. Addi‑
tionally, the pool coordinator’s IP address can be specified (which is necessary if it has changed.)
1 xe-reset-networking
To reset networking for DHCP if the pool coordinator’s IP address was changed:
1 xe-reset-networking --master=pool-coordinator-ip-address
To reset networking for Static IP configuration, assuming the pool coordinator’s IP address didn’t
change:
To reset networking for DHCP configuration if the management interface and the pool coordinator’s
IP address was changed after initial setup:
Storage
February 7, 2024
This section describes how physical storage hardware maps to virtual machines (VMs), and the soft‑
ware objects used by the management API to perform storage‑related tasks. Detailed sections on each
of the supported storage types include the following information:
• Procedures for creating storage for VMs using the CLI, with type‑specific device configuration
options
• Generating snapshots for backup purposes
• Best practices for managing storage
A Storage Repository (SR) is a particular storage target, in which Virtual Machine (VM) Virtual Disk Im‑
ages (VDIs) are stored. A VDI is a storage abstraction that represents a virtual hard disk drive (HDD).
SRs are flexible, with built‑in support for the following drives:
Locally connected:
• SATA
• SCSI
• SAS
• NVMe
The local physical storage hardware can be a hard disk drive (HDD) or a solid state drive (SSD).
Remotely connected:
• iSCSI
• NFS
• SAS
• SMB (version 3 only)
• Fibre Channel
Note:
NVMe over Fibre Channel and NVMe over TCP are not supported.
The SR and VDI abstractions allow for advanced storage features to be exposed on storage targets
that support them. For example, advanced features such as thin provisioning, VDI snapshots, and fast
cloning. For storage subsystems that don’t support advanced operations directly, a software stack
that implements these features is provided. This software stack is based on Microsoft’s Virtual Hard
Disk (VHD) specification.
A storage repository is a persistent, on‑disk data structure. For SR types that use an underlying block
device, the process of creating an SR involves erasing any existing data on the specified storage target.
Other storage types such as NFS, create a container on the storage array in parallel to existing SRs.
Each XenServer host can use multiple SRs and different SR types simultaneously. These SRs can be
shared between hosts or dedicated to particular hosts. Shared storage is pooled between multiple
hosts within a defined resource pool. A shared SR must be network accessible to each host in the
pool. All hosts in a single resource pool must have at least one shared SR in common. Shared storage
cannot be shared between multiple pools.
SR commands provide operations for creating, destroying, resizing, cloning, connecting and discover‑
ing the individual VDIs that they contain. CLI operations to manage storage repositories are described
in SR commands.
Warning:
XenServer does not support snapshots at the external SAN‑level of a LUN for any SR type.
A virtual disk image (VDI) is a storage abstraction that represents a virtual hard disk drive (HDD). VDIs
are the fundamental unit of virtualized storage in XenServer. VDIs are persistent, on‑disk objects that
exist independently of XenServer hosts. CLI operations to manage VDIs are described in VDI com‑
mands. The on‑disk representation of the data differs by SR type. A separate storage plug‑in interface
for each SR, called the SM API, manages the data.
Physical block devices represent the interface between a physical server and an attached SR. PBDs are
connector objects that allow a given SR to be mapped to a host. PBDs store the device configuration
fields that are used to connect to and interact with a given storage target. For example, NFS device
configuration includes the IP address of the NFS server and the associated path that the XenServer
host mounts. PBD objects manage the run‑time attachment of a given SR to a given XenServer host.
CLI operations relating to PBDs are described in PBD commands.
Virtual Block Devices are connector objects (similar to the PBD described above) that allows mappings
between VDIs and VMs. In addition to providing a mechanism for attaching a VDI into a VM, VBDs
allow for the fine‑tuning of parameters regarding the disk I/O priority and statistics of a given VDI, and
whether that VDI can be booted. CLI operations relating to VBDs are described in VBD commands.
The following image is a summary of how the storage objects presented so far are related:
In general, there are the following types of mapping of physical storage to a VDI:
1. Logical volume‑based VHD on a LUN: The default XenServer block‑based storage inserts a logical
volume manager on a disk. This disk is either a locally attached device (LVM) or a SAN attached
LUN over either Fibre Channel, iSCSI, or SAS. VDIs are represented as volumes within the volume
manager and stored in VHD format to allow thin provisioning of reference nodes on snapshot
and clone.
2. File‑based QCOW2 on a LUN: VM images are stored as thin‑provisioned QCOW2 format files on a
GFS2 shared‑disk filesystem on a LUN attached over either iSCSI software initiator or Hardware
HBA.
3. File‑based VHD on a filesystem: VM images are stored as thin‑provisioned VHD format files on
either a local non‑shared filesystem (EXT3/EXT4 type SR), a shared NFS target (NFS type SR), or
a remote SMB target (SMB type SR).
4. File‑based QCOW2 on a filesystem: VM images are stored as thin‑provisioned QCOW2 format files
on a local non‑shared XFS filesystem.
VDI types
For other SR types, VHD format VDIs are created. You can opt to use raw at the time you create the VDI.
This option can only be specified by using the xe CLI.
Note:
If you create a raw VDI on an LVM‑based SR or HBA/LUN‑per‑VDI SR, it might allow the owning VM
to access data that was part of a previously deleted VDI (of any format) belonging to any VM. We
recommend that you consider your security requirements before using this option.
Raw VDIs on a NFS, EXT, or SMB SR do not allow access to the data of previously deleted VDIs
belonging to any VM.
To check if a VDI was created with type=raw, check its sm-config map. The sr-param-list
and vdi-param-list xe commands can be used respectively for this purpose.
1. Run the following command to create a VDI given the UUID of the SR you want to place the
virtual disk in:
2. Attach the new virtual disk to a VM. Use the disk tools within the VM to partition and format, or
otherwise use the new disk. You can use the vbd-create command to create a VBD to map
the virtual disk into your VM.
It is not possible to do a direct conversion between the raw and VHD formats. Instead, you can create
a VDI (either raw, as described above, or VHD) and then copy data into it from an existing volume. Use
the xe CLI to ensure that the new VDI has a virtual size at least as large as the VDI you are copying from.
You can do this by checking its virtual-size field, for example by using the vdi-param-list
command. You can then attach this new VDI to a VM and use your preferred tool within the VM to do
a direct block‑copy of the data. For example, standard disk management tools in Windows or the dd
command in Linux. If the new volume is a VHD volume, use a tool that can avoid writing empty sectors
to the disk. This action can ensure that space is used optimally in the underlying storage repository.
A file‑based copy approach may be more suitable.
VHD and QCOW2 images can be chained, allowing two VDIs to share common data. In cases where
a VHD‑backed or QCOW2‑backed VM is cloned, the resulting VMs share the common on‑disk data at
the time of cloning. Each VM proceeds to make its own changes in an isolated copy‑on‑write version
of the VDI. This feature allows such VMs to be quickly cloned from templates, facilitating very fast
provisioning and deployment of new VMs.
As VMs and their associated VDIs get cloned over time this creates trees of chained VDIs. When one of
the VDIs in a chain is deleted, XenServer rationalizes the other VDIs in the chain to remove unnecessary
VDIs. This coalescing process runs asynchronously. The amount of disk space reclaimed and time
taken to perform the process depends on the size of the VDI and amount of shared data.
Both the VHD and QCOW2 formats support thin provisioning. The image file is automatically extended
in fine granular chunks as the VM writes data into the disk. For file‑based VHD and GFS2‑based QCOW2,
this approach has the considerable benefit that VM image files take up only as much space on the
physical storage as required. With LVM‑based VHD, the underlying logical volume container must be
sized to the virtual size of the VDI. However unused space on the underlying copy‑on‑write instance
disk is reclaimed when a snapshot or clone occurs. The difference between the two behaviors can be
described in the following way:
• For LVM‑based VHD images, the difference disk nodes within the chain consume only as much
data as has been written to disk. However, the leaf nodes (VDI clones) remain fully inflated to
the virtual size of the disk. Snapshot leaf nodes (VDI snapshots) remain deflated when not in
use and can be attached Read‑only to preserve the deflated allocation. Snapshot nodes that
are attached Read‑Write are fully inflated on attach, and deflated on detach.
• For file‑based VHDs and GFS2‑based QCOW2 images, all nodes consume only as much data as
has been written. The leaf node files grow to accommodate data as it is actively written. If a 100
GB VDI is allocated for a VM and an OS is installed, the VDI file is physically only the size of the
OS data on the disk, plus some minor metadata overhead.
When cloning VMs based on a single VHD or QCOW2 template, each child VM forms a chain where new
changes are written to the new VM. Old blocks are directly read from the parent template. If the new
VM was converted into a further template and more VMs cloned, then the resulting chain results in
degraded performance. XenServer supports a maximum chain length of 30. Do not approach this
limit without good reason. If in doubt, “copy”the VM using XenCenter or use the vm-copy command,
which resets the chain length back to 0.
VHD‑specific notes on coalesce Only one coalescing process is ever active for an SR. This process
thread runs on the SR pool coordinator.
If you have critical VMs running on the pool coordinator, you can take the following steps to mitigate
against occasional slow I/O:
September 5, 2024
You can use the New Storage Repository wizard in XenCenter to create storage repositories (SRs). The
wizard guides you through the configuration steps. Alternatively, use the CLI, and the sr-create
command. The sr-create command creates an SR on the storage substrate (potentially destroying
any existing data). It also creates the SR API object and a corresponding PBD record, enabling VMs to
use the storage. On successful creation of the SR, the PBD is automatically plugged. If the SR shared
=true flag is set, a PBD record is created and plugged for every XenServer in the resource pool.
If you are creating an SR for IP‑based storage (iSCSI or NFS), you can configure one of the following as
the storage network: the NIC that handles the management traffic or a new NIC for the storage traffic.
To assign an IP address to a NIC, see Configure a dedicated storage NIC.
All XenServer SR types support VDI resize, fast cloning, and snapshot. SRs based on the LVM SR type
(local, iSCSI, or HBA) provide thin provisioning for snapshot and hidden parent nodes. The other SR
types (EXT3/EXT4, NFS, GFS2) support full thin provisioning, including for virtual disks that are ac‑
tive.
Warnings:
• When VHD VDIs are not attached to a VM, for example for a VDI snapshot, they are stored
as thinly provisioned by default. If you attempt to reattach the VDI, ensure that there is
sufficient disk‑space available for the VDI to become thickly provisioned. VDI clones are
thickly provisioned.
• XenServer does not support snapshots at the external SAN‑level of a LUN for any SR type.
• Do not attempt to create an SR where the LUN ID of the destination LUN is greater than
255. Ensure that your target exposes the LUN with a LUN ID that is less than or equal to 255
before using this LUN to create an SR.
• If you use thin provisioning on a file‑based SR, ensure that you monitor the free space on
your SR. If the SR usage grows to 100%, further writes from VMs fail. These failed writes can
cause the VM to freeze or crash.
EXT3/EXT4 2 TiB
GFS2 (with iSCSI or HBA) 16 TiB
XFS 16 TiB
LVM 2 TiB
LVMoFCOE (deprecated) 2 TiB
LVMoHBA 2 TiB
LVMoiSCSI 2 TiB
NFS 2 TiB
SMB 2 TiB
Local LVM
The Local LVM type presents disks within a locally attached Volume Group.
By default, XenServer uses the local disk on the physical host on which it is installed. The Linux Logical
Volume Manager (LVM) is used to manage VM storage. A VDI is implemented in VHD format in an LVM
logical volume of the specified size.
Note:
The block size of an LVM LUN must be 512 bytes. To use storage with 4 KB physical blocks, the
storage must also support emulation of 512 byte allocation blocks (the logical block size must
be 512 bytes).
The snapshot and fast clone functionality for LVM‑based SRs comes with an inherent performance
overhead. When optimal performance is required, XenServer supports creation of VDIs in the raw
format in addition to the default VHD format. The XenServer snapshot functionality is not supported
on raw VDIs.
Warning:
Do not try to snapshot a VM that has type=raw disks attached. This action can result in a partial
snapshot being created. In this situation, you can identify the orphan snapshot VDIs by checking
the snapshot-of field and then deleting them.
Local EXT3/EXT4
Using EXT3/EXT4 enables thin provisioning on local storage. However, the default storage repository
type is LVM as it gives a consistent write performance and, prevents storage over‑commit. If you use
EXT3/EXT4, you might see reduced performance in the following cases:
Local disk EXT3/EXT4 SRs must be configured using the XenServer CLI.
Whether a local EXT SR uses EXT3 or EXT4 depends on what version of XenServer created it:
• If you created the local EXT SR on an earlier version of Citrix Hypervisor or XenServer and then
upgraded to XenServer 8, it uses EXT3.
• If you created the local EXT SR on XenServer 8, it uses EXT4.
Note:
The block size of an EXT3/EXT4 disk must be 512 bytes. To use storage with 4 KB physical blocks,
the storage must also support emulation of 512 byte allocation blocks (the logical block size must
be 512 bytes).
Local XFS
Using XFS enables thin provisioning on local storage. The local XFS type allows you to create local
storage devices with 4 KB physical blocks without requiring a logical block size of 512 bytes.
udev
The udev type represents devices plugged in using the udev device manager as VDIs.
XenServer has two SRs of type udev that represent removable storage. One is for the CD or DVD disk
in the physical CD or DVD‑ROM drive of the XenServer host. The other is for a USB device plugged into
a USB port of the XenServer host. VDIs that represent the media come and go as disks or USB sticks
are inserted and removed.
ISO
The ISO type handles CD images stored as files in ISO format. This SR type is useful for creating shared
ISO libraries.
• nfs_iso: The NFS ISO SR type handles CD images stored as files in ISO format available as an
NFS share.
• cifs: The Windows File Sharing (SMB/CIFS) SR type handles CD images stored as files in ISO
format available as a Windows (SMB/CIFS) share.
If you do not specify the storage type to use for the SR, XenServer uses the location device config
parameter to decide the type.
Note:
When running the sr-create command, we recommend that you use the device-config:
cifspassword_secret argument instead of specifying the password on the command line.
For more information, see Secrets.
For storage repositories that store a library of ISOs, the content-type parameter must be set to
iso, for example:
You can use NFS or SMB to mount the ISO SR. For more information about using these SR types, see
NFS and SMB.
We recommend that you use SMB version 3 to mount ISO SR on Windows file server. Version 3 is
selected by default because it is more secure and robust than SMB version 1.0. However, you can
mount ISO SR using SMB version 1 using the following command:
XenServer supports shared SRs on iSCSI LUNs. iSCSI is supported using the Open‑iSCSI software iSCSI
initiator or by using a supported iSCSI Host Bus Adapter (HBA). The steps for using iSCSI HBAs are
identical to the steps for Fibre Channel HBAs. Both sets of steps are described in Create a Shared LVM
over Fibre Channel / Fibre Channel over Ethernet / iSCSI HBA or SAS SR.
Shared iSCSI support using the software iSCSI initiator is implemented based on the Linux Volume
Manager (LVM). This feature provides the same performance benefits provided by LVM VDIs in the local
disk case. Shared iSCSI SRs using the software‑based host initiator can support VM agility using live
migration: VMs can be started on any XenServer host in a resource pool and migrated between them
with no noticeable downtime.
iSCSI SRs use the entire LUN specified at creation time and may not span more than one LUN. CHAP
support is provided for client authentication, during both the data path initialization and the LUN
discovery phases.
Note:
The block size of an iSCSI LUN must be 512 bytes. To use storage with 4 KB physical blocks, the
storage must also support emulation of 512 byte allocation blocks (the logical block size must
be 512 bytes).
All iSCSI initiators and targets must have a unique name to ensure they can be uniquely identified
on the network. An initiator has an iSCSI initiator address, and a target has an iSCSI target address.
Collectively these names are called iSCSI Qualified Names, or IQNs.
XenServer hosts support a single iSCSI initiator which is automatically created and configured with
a random IQN during host installation. The single initiator can be used to connect to multiple iSCSI
targets concurrently.
iSCSI targets commonly provide access control using iSCSI initiator IQN lists. All iSCSI targets/LUNs
that your XenServer host accesses must be configured to allow access by the host’s initiator IQN. Sim‑
ilarly, targets/LUNs to be used as shared iSCSI SRs must be configured to allow access by all host IQNs
in the resource pool.
Note:
iSCSI targets that do not provide access control typically default to restricting LUN access to a
single initiator to ensure data integrity. If an iSCSI LUN is used as a shared SR across multiple
hosts in a pool, ensure that multi‑initiator access is enabled for the specified LUN.
The XenServer host IQN value can be adjusted using XenCenter, or using the CLI with the following
command when using the iSCSI software initiator:
Warning:
• Each iSCSI target and initiator must have a unique IQN. If a non‑unique IQN identifier is
used, data corruption or denial of LUN access can occur.
• Do not change the XenServer host IQN with iSCSI SRs attached. Doing so can result in fail‑
ures connecting to new targets or existing SRs.
Software FCoE provides a standard framework to which hardware vendors can plug in their FCoE‑
capable NIC and get the same benefits of a hardware‑based FCoE. This feature eliminates the need
for using expensive HBAs.
Note:
Before you create a software FCoE storage, manually complete the configuration required to expose a
LUN to the host. This configuration includes configuring the FCoE fabric and allocating LUNs to your
SAN’s public world wide name (PWWN). After you complete this configuration, the available LUN is
mounted to the host’s CNA as a SCSI device. The SCSI device can then be used to access the LUN as if
it were a locally attached SCSI device. For information about configuring the physical switch and the
array to support FCoE, see the documentation provided by the vendor.
Note:
Software FCoE can be used with Open vSwitch and Linux bridge as the network back‑end.
Before creating a Software FCoE SR, customers must ensure that there are FCoE‑capable NICs at‑
tached to the host.
1 xe sr-create type=lvmofcoe \
2 name-label="FCoE SR" shared=true device-config:SCSIid=SCSI_id
This section covers various operations required to manage SAS, Fibre Channel, and iSCSI HBAs.
For details on configuring QLogic Fibre Channel and iSCSI HBAs, see the Cavium website.
Once the HBA is physically installed into the XenServer host, use the following steps to configure the
HBA:
1. Set the IP networking configuration for the HBA. This example assumes DHCP and HBA port 0.
Specify the appropriate values if using static IP addressing or a multi‑port HBA.
1 /opt/QLogic_Corporation/SANsurferiCLI/iscli -ipdhcp 0
1 /opt/QLogic_Corporation/SANsurferiCLI/iscli -pa 0
iscsi_target_ip_address
3. Use the xe sr-probe command to force a rescan of the HBA controller and display available
LUNs. For more information, see Probe an SR and Create a Shared LVM over Fibre Channel /
Fibre Channel over Ethernet / iSCSI HBA or SAS SR.
Note:
This step is not required. We recommend that only power users perform this process if it is nec‑
essary.
Each HBA‑based LUN has a corresponding global device path entry under /dev/disk/by-
scsibus in the format <SCSIid>-<adapter>:<bus>:<target>:<lun> and a standard
device path under /dev. To remove the device entries for LUNs no longer in use as SRs, use the
following steps:
1. Use sr-forget or sr-destroy as appropriate to remove the SR from the XenServer host
database. See Remove SRs for details.
2. Remove the zoning configuration within the SAN for the desired LUN to the desired host.
3. Use the sr-probe command to determine the ADAPTER, BUS, TARGET, and LUN values corre‑
sponding to the LUN to be removed. For more information, Probe an SR.
Warning:
Make sure that you are certain which LUN you are removing. Accidentally removing a LUN re‑
quired for host operation, such as the boot or root device, renders the host unusable.
The Shared LVM type represents disks as Logical Volumes within a Volume Group created on an iSCSI
(FC or SAS) LUN.
Note:
The block size of an iSCSI LUN must be 512 bytes. To use storage with 4 KB physical blocks, the
storage must also support emulation of 512 byte allocation blocks (the logical block size must
be 512 bytes).
Create a shared LVM over iSCSI SR by using the Software iSCSI initiator
Note:
When running the sr-create command, we recommend that you use the device-config:
chappassword_secret argument instead of specifying the password on the command line.
For more information, see Secrets.
To create a shared LVMoiSCSI SR on a specific LUN of an iSCSI target, use the following command.
Create a Shared LVM over Fibre Channel / Fibre Channel over Ethernet / iSCSI HBA or SAS SR
SRs of type LVMoHBA can be created and managed using the xe CLI or XenCenter.
To create a shared LVMoHBA SR, perform the following steps on each host in the pool:
1. Zone in one or more LUNs to each XenServer host in the pool. This process is highly specific to
the SAN equipment in use. For more information, see your SAN documentation.
2. If necessary, use the HBA CLI included in the XenServer host to configure the HBA:
• Emulex: /bin/sbin/ocmanager
For an example of QLogic iSCSI HBA configuration, see Hardware host bus adapters (HBAs) in the
previous section. For more information on Fibre Channel and iSCSI HBAs, see the Broadcom and
Cavium websites.
3. Use the sr-probe command to determine the global device path of the HBA LUN. The sr-
probe command forces a rescan of HBAs installed in the system to detect any new LUNs that
have been zoned to the host. The command returns a list of properties for each LUN found.
Specify the host-uuid parameter to ensure that the probe occurs on the desired host.
The global device path returned as the <path> property is common across all hosts in the pool.
Therefore, this path must be used as the value for the device-config:device parameter
when creating the SR.
If multiple LUNs are present use the vendor, LUN size, LUN serial number, or the SCSI ID from
the <path> property to identify the desired LUN.
1 xe sr-probe type=lvmohba \
2 host-uuid=1212c7b3-f333-4a8d-a6fb-80c5b79b5b31
3 Error code: SR_BACKEND_FAILURE_90
4 Error parameters: , The request is missing the device
parameter, \
5 <?xml version="1.0" ?>
6 <Devlist>
7 <BlockDevice>
8 <path>
9 /dev/disk/by-id/scsi-360
a9800068666949673446387665336f
10 </path>
11 <vendor>
12 HITACHI
13 </vendor>
14 <serial>
15 730157980002
16 </serial>
17 <size>
18 80530636800
19 </size>
20 <adapter>
21 4
22 </adapter>
23 <channel>
24 0
25 </channel>
26 <id>
27 4
28 </id>
29 <lun>
30 2
31 </lun>
32 <hba>
33 qla2xxx
34 </hba>
35 </BlockDevice>
36 <Adapter>
37 <host>
38 Host4
39 </host>
40 <name>
41 qla2xxx
42 </name>
43 <manufacturer>
44 QLogic HBA Driver
45 </manufacturer>
46 <id>
47 4
48 </id>
49 </Adapter>
50 </Devlist>
4. On the pool coordinator, create the SR. Specify the global device path returned in the <path>
property from sr-probe. PBDs are created and plugged for each host in the pool automati‑
cally.
1 xe sr-create host-uuid=valid_uuid \
2 content-type=user \
3 name-label="Example shared LVM over HBA SR" shared=true \
4 device-config:SCSIid=device_scsi_id type=lvmohba
Note:
You can use the XenCenter Repair Storage Repository function to retry the PBD creation and plug‑
ging portions of the sr-create operation. This function can be valuable in cases where the
LUN zoning was incorrect for one or more hosts in a pool when the SR was created. Correct the
zoning for the affected hosts and use the Repair Storage Repository function instead of removing
and re‑creating the SR.
Thin provisioning better utilizes the available storage by allocating disk storage space to VDIs as data
is written to the virtual disk, rather than allocating the full virtual size of the VDI in advance. Thin
provisioning enables you to significantly reduce the amount of space required on a shared storage
array, and with that your Total Cost of Ownership (TCO).
Thin provisioning for shared block storage is of particular interest in the following cases:
• You want increased space efficiency. Images are sparsely and not thickly allocated.
• You want to reduce the number of I/O operations per second on your storage array. The GFS2
SR is the first SR type to support storage read caching on shared block storage.
• You use a common base image for multiple virtual machines. The images of individual VMs will
then typically utilize even less space.
• You use snapshots. Each snapshot is an image and each image is now sparse.
• Your storage does not support NFS and only supports block storage. If your storage supports
NFS, we recommend you use NFS instead of GFS2.
• You want to create VDIs that are greater than 2 TiB in size. The GFS2 SR supports VDIs up to 16
TiB in size.
Note:
We recommend not to use a GFS2 SR with a VLAN due to a known issue where you cannot add or
remove hosts on a clustered pool if the cluster network is on a non‑management VLAN.
The shared GFS2 SR type creates a GFS2 filesystem on an iSCSI or HBA LUN. VDIs are stored in the GFS2
SR as files in the QCOW2 image format.
For more information about using GFS2 storage, see Thin‑provisioned shared GFS2 block storage.
Shares on NFS servers (that support any version of NFSv4 or NFSv3) or on SMB servers (that support
SMB 3) can be used immediately as an SR for virtual disks. VDIs are stored in the Microsoft VHD format
only. Additionally, as these SRs can be shared, VDIs stored on shared SRs allow:
• VM migrate between XenServer hosts in a resource pool using live migration (without noticeable
downtime)
Important:
• Support for SMB3 is limited to the ability to connect to a share using the 3 protocol. Ex‑
tra features like Transparent Failover depend on feature availability in the upstream Linux
kernel and are not supported in XenServer 8.
• Clustered SMB is not supported with XenServer.
• For NFSv4, only the authentication type AUTH_SYS is supported.
• SMB storage is available for XenServer Premium Edition customers.
• It is highly recommended for both NFS and SMB storage that a dedicated storage network
be used, using at least two bonded links, ideally to independent network switches with
redundant power supplies.
• When using SMB storage, do not remove the share from the storage before detaching the
SMB SR.
VDIs stored on file‑based SRs are thinly provisioned. The image file is allocated as the VM writes data
into the disk. This approach has the considerable benefit that the VM image files take up only as much
space on the storage as is required. For example, if a 100 GB VDI is allocated for a VM and an OS is
installed, the VDI file only reflects the size of the OS data written to the disk rather than the entire 100
GB.
VHD files may also be chained, allowing two VDIs to share common data. In cases where a file‑based
VM is cloned, the resulting VMs share the common on‑disk data at the time of cloning. Each VM pro‑
ceeds to make its own changes in an isolated copy‑on‑write version of the VDI. This feature allows file‑
based VMs to be quickly cloned from templates, facilitating very fast provisioning and deployment of
new VMs.
Note:
File‑based SRs and VHD implementations in XenServer assume that they have full control over the SR
directory on the file server. Administrators must not modify the contents of the SR directory, as this
action can risk corrupting the contents of VDIs.
XenServer has been tuned for enterprise‑class storage that uses non‑volatile RAM to provide fast ac‑
knowledgments of write requests while maintaining a high degree of data protection from failure.
XenServer has been tested extensively against Network Appliance FAS2020 and FAS3210 storage, us‑
ing Data OnTap 7.3 and 8.1
Warning:
As VDIs on file‑based SRs are created as thin provisioned, administrators must ensure that the
file‑based SRs have enough disk space for all required VDIs. XenServer hosts do not enforce that
the space required for VDIs on file‑based SRs is present.
Ensure that you monitor the free space on your SR. If the SR usage grows to 100%, further writes
from VMs fail. These failed writes can cause the VM to freeze or crash.
Note:
If you attempt to attach a read‑only NFS SR, this action fails with the following error message:
“SR_BACKEND_FAILURE_461 ‑ The file system for SR cannot be written to.”
To create an NFS SR, you must provide the hostname or IP address of the NFS server. You can create
the SR on any valid destination path; use the sr-probe command to display a list of valid destination
paths exported by the server.
In scenarios where XenServer is used with lower‑end storage, it cautiously waits for all writes to be
acknowledged before passing acknowledgments on to VMs. This approach incurs a noticeable perfor‑
mance cost, and might be solved by setting the storage to present the SR mount point as an asynchro‑
nous mode export. Asynchronous exports acknowledge writes that are not actually on disk. Consider
the risks of failure carefully in these situations.
Note:
The NFS server must be configured to export the specified path to all hosts in the pool. If this
configuration is not done, the creation of the SR and the plugging of the PBD record fails.
The XenServer NFS implementation uses TCP by default. If your situation allows, you can configure
the implementation to use UDP in scenarios where there may be a performance benefit. To do this
configuration, when creating an SR, specify the device-config parameter useUDP=true.
For example, to create a shared NFS SR on 192.168.1.10:/export1, using any version 4 of NFS
that is made available by the filer, use the following command:
1 xe sr-create content-type=user \
2 name-label="shared NFS SR" shared=true \
3 device-config:server=192.168.1.10 device-config:serverpath=/export1
type=nfs \
4 device-config:nfsversion="4"
To create an SMB SR, provide the hostname or IP address of the SMB server, the full path of the ex‑
ported share, and appropriate credentials.
Note:
When running the sr-create command, we recommend that you use the device-config
:password_secret argument instead of specifying the password on the command line. For
more information, see Secrets.
For example, to create a shared SMB SR on 192.168.1.10:/share1, use the following com‑
mand:
1 xe sr-create content-type=user \
2 name-label="Example shared SMB SR" shared=true \
3 device-config:server=//192.168.1.10/share1 \
4 device-config:username=valid_username device-config:password_secret
=valid_password_secret type=smb
The LVM over hardware HBA type represents disks as VHDs on Logical Volumes within a Volume Group
created on an HBA LUN that provides, for example, hardware‑based iSCSI or FC support.
XenServer hosts support Fibre Channel SANs through Emulex or QLogic host bus adapters (HBAs).
All Fibre Channel configuration required to expose a Fibre Channel LUN to the host must be com‑
pleted manually. This configuration includes storage devices, network devices, and the HBA within
the XenServer host. After all FC configuration is complete, the HBA exposes a SCSI device backed by
the FC LUN to the host. The SCSI device can then be used to access the FC LUN as if it were a locally
attached SCSI device.
Use the sr-probe command to list the LUN‑backed SCSI devices present on the host. This command
forces a scan for new LUN‑backed SCSI devices. The path value returned by sr-probe for a LUN‑
backed SCSI device is consistent across all hosts with access to the LUN. Therefore, this value must be
used when creating shared SRs accessible by all hosts in a resource pool.
See Create storage repositories for details on creating shared HBA‑based FC and iSCSI SRs.
Note:
XenServer support for Fibre Channel does not support direct mapping of a LUN to a VM. HBA‑
based LUNs must be mapped to the host and specified for use in an SR. VDIs within the SR are
exposed to VMs as standard block devices.
The block size of an LVM over HBA LUN must be 512 bytes. To use storage with 4 KB physical
blocks, the storage must also support emulation of 512 byte allocation blocks (the logical block
size must be 512 bytes).
June 5, 2024
Thin provisioning better utilizes the available storage by allocating disk storage space to VDIs as data
is written to the virtual disk, rather than allocating the full virtual size of the VDI in advance. Thin
provisioning enables you to significantly reduce the amount of space required on a shared storage
array, and with that your Total Cost of Ownership (TCO).
Thin provisioning for shared block storage is of particular interest in the following cases:
• You want increased space efficiency. Images are sparsely and not thickly allocated.
• You want to reduce the number of I/O operations per second on your storage array. The GFS2
SR is the first SR type to support storage read caching on shared block storage.
• You use a common base image for multiple virtual machines. The images of individual VMs will
then typically utilize even less space.
• You use snapshots. Each snapshot is an image and each image is now sparse.
• You want to create VDIs that are greater than 2 TiB in size. The GFS2 SR supports VDIs up to 16
TiB in size.
• Your storage doesn’t support NFS or SMB3 and only supports block storage. If your storage
supports NFS or SMB3, we recommend you use these SR types instead of GFS2.
• Your storage doesn’t support thin provisioning of LUNs. If your storage does thin provision LUNs,
you can encounter problems and run out of space when combining it with GFS2. Combining
GFS2 with a thin‑provisioned LUN does not provide many additional benefits and is not recom‑
mended.
Note:
We recommend not to use a GFS2 SR with a VLAN due to a known issue where you cannot add or
remove hosts on a clustered pool if the cluster network is on a non‑management VLAN.
The shared GFS2 type represents disks as a filesystem created on an iSCSI or HBA LUN. VDIs stored on
a GFS2 SR are stored in the QCOW2 image format.
This article describes how to set up your GFS2 environment by using the xe CLI. To set up a GFS2
environment by using XenCenter, see the XenCenter product documentation.
To provide the benefits of thin provisioning on shared block storage without risk of data loss, your pool
must deliver a good level of reliability and connectivity. It is crucial that the hosts in the resource pool
that uses GFS2 can reliably communicate with one another. To ensure this, XenServer requires that
you use a clustered pool with your GFS2 SR. We also recommend that you design your environment
and configure XenServer features to provide as much resiliency and redundancy as possible.
Before setting up your XenServer pool to work with GFS2 SRs, review the following requirements and
recommendations for an ideal GFS2 environment:
A clustered pool with GFS2 SRs has some differences in behavior to other types of pool and SR. For
more information, see Constraints.
A bonded network links two or more NICs together to create a single channel for network traffic. We
recommend that you use a bonded network for your clustered pool traffic. However, before you set
up your bonded network, ensure that your network hardware configuration promotes redundancy in
the bonded network. Consider implementing as many of these recommendations as is feasible for
your organization and environment.
The following best practices add resiliency against software, hardware, or power failures that can af‑
fect your network switches.
• Ensure that you have separate physical network switches available for use in the bonded net‑
work, not just ports on the same switch.
• Ensure that the separate switches draw power from different, independent power distribution
units (PDUs).
• If possible, in your data center, place the PDUs on different phases of the power feed or even
feeds provided by different utility companies.
• Consider using uninterruptible power supply units to ensure that the network switches and
servers can continue to function or perform an orderly shutdown in the event of a power failure.
It is important to ensure that hosts in a clustered pool can communicate reliably with one another.
Creating a bonded network for this pool traffic increases the resiliency of your clustered pool.
A bonded network creates a bond between two or more NICs to create a single, high‑performing chan‑
nel that your clustered pool can use for cluster heartbeat traffic. We strongly recommend that this
bonded network is not used for any other traffic. Create a separate network for the pool to use for
management traffic.
Warning:
If you choose not to follow this recommendation, you are at a higher risk of losing cluster manage‑
ment network packets. Loss of cluster management network packets can cause your clustered
pool to lose quorum and some or all hosts in the pool will self‑fence.
1. If you have a firewall between the hosts in your pool, ensure that hosts can communicate on the
cluster network using the following ports:
2. Open a console on the XenServer host that you want to act as the pool coordinator.
3. Create a network for use with the bonded NIC by using the following command:
1 xe network-create name-label=bond0
4. Find the UUIDs of the PIFs to use in the bond by using the following command:
1 xe pif-list
5. Create your bonded network in either active‑active mode, active‑passive mode, or LACP bond
mode. Depending on the bond mode you want to use, complete one of the following actions:
• To configure the bond in active‑active mode (default), use the bond-create command
to create the bond. Using commas to separate the parameters, specify the newly created
network UUID and the UUIDs of the PIFs to be bonded:
1 xe bond-create network-uuid=<network_uuid> /
2 pif-uuids=<pif_uuid_1>,<pif_uuid_2>,<pif_uuid_3>,<
pif_uuid_4>
Type two UUIDs when you are bonding two NICs and four UUIDs when you are bonding
four NICs. The UUID for the bond is returned after running the command.
• To configure the bond in active‑passive or LACP bond mode, use the same syntax, add the
optional mode parameter, and specify lacp or active-backup:
1 xe bond-create network-uuid=<network_uuid> /
2 pif-uuids=<pif_uuid_1>,<pif_uuid_2>,<pif_uuid_3>,<
pif_uuid_4> /
3 mode=balance-slb | active-backup | lacp
After you create your bonded network on the pool coordinator, when you join other XenServer hosts
to the pool, the network and bond information is automatically replicated to the joining server.
Note:
• Changing the IP address of the cluster network by using XenCenter requires clustering and
GFS2 to be temporarily disabled.
• Do not change the bonding of your clustering network while the cluster is live and has run‑
ning VMs. This action can cause hosts in the cluster to hard restart (fence).
• If you have an IP address conflict (multiple hosts having the same IP address) on your clus‑
tering network involving at least one host with clustering enabled, the cluster does not form
correctly and the hosts are unable to fence when required. To fix this issue, resolve the IP
address conflict.
For bonded networks that use active‑passive mode, if the active link fails, there is a failover period
when the network link is broken while the passive link becomes active. If the time it takes for your
active‑passive bonded network to fail over is longer than the cluster timeout, some or all hosts in
your clustered pool might still fence.
You can test your bonded network failover time by forcing the network to fail over by using one of the
following methods:
The cluster timeout value of your pool depends on how many hosts are in your cluster. Run the fol‑
lowing command to find the token-timeout value in seconds for the pool:
If the failover time is likely to be greater than the timeout value, your network infrastructure and con‑
figuration might not be reliable enough to support a clustered pool.
To use shared GFS2 storage, the XenServer resource pool must be a clustered pool. Enable clustering
on your pool before creating a GFS2 SR.
A clustered pool is a pool of XenServer hosts that are more closely connected and coordinated than
hosts in non‑clustered pools. The hosts in the cluster maintain constant communication with each
other on a selected network. All hosts in the cluster are aware of the state of every host in the cluster.
This host coordination enables the cluster to control access to the contents of the GFS2 SR. To ensure
that the clustered pool always remains in communication, each host in a cluster must always be in
communication with at least half of the hosts in the cluster (including itself). This state is known as
a host having quorum. If a host does not have quorum, it hard restarts and removes itself from the
cluster. This action is referred to as ‘fencing’.
Before you start setting up your clustered pool, ensure that the following prerequisites are met:
Where possible, use an odd number of hosts in a clustered pool as this ensures that hosts are
always able to determine if they have quorun. We recommend that you use clustering only in
pools containing at least three hosts, as pools of two hosts are sensitive to self‑fencing the entire
pool.
• All XenServer hosts in the clustered pool must have at least 2 GiB of control domain memory.
• All hosts in the cluster must use static IP addresses for the cluster network.
• If you are clustering an existing pool, ensure that high availability is disabled. You can enable
high availability again after clustering is enabled.
Repeat the following steps on each joining XenServer host that is not the pool coordinator:
b) Join the XenServer host to the pool on the pool coordinator by using the following com‑
mand:
1 xe pool-join master-address=<master_address> /
2 master-username=<administrators_username> /
3 master-password=<password>
The value of the master-address parameter must be set to the fully qualified domain
name of the XenServer host that is the pool coordinator. The password must be the ad‑
ministrator password set when the pool coordinator was installed.
a) Find the UUIDs of the PIFs that belong to the network by using the following command:
1 xe pif-list
3. Enable clustering on your pool. Run the following command on a XenServer host in your re‑
source pool:
1 xe cluster-pool-create network-uuid=<network_uuid>
Provide the UUID of the bonded network that you created in an earlier step.
If you have insufficient control domain memory on your hosts, your pool can experience network in‑
stabililty. Network instability can cause problems for a clustered pool with GFS2 SRs.
It is important to ensure that your clustered pool has an appropriate amount of control domain mem‑
ory. For information about changing the amount of control domain memory and monitoring the mem‑
ory behavior, see Memory usage.
Ensure that storage multipathing is set up between your clustered pool and your GFS2 SR.
Multipathing routes storage traffic to a storage device over multiple paths for redundancy. All routes
can have active traffic on them during normal operation, which results in increased throughput.
Before enabling multipathing, verify that the following statements are true:
• Your ethernet or fibre switch is configured to make multiple targets available on your storage
server.
For example, an iSCSI storage back‑end queried for sendtargets on a given portal returns
multiple targets, as in the following example:
However, you can perform additional configuration to enable iSCSI multipath for arrays that
only expose a single target. For more information, see iSCSI multipath for arrays that only ex‑
pose a single target.
• For iSCSI only, the control domain (dom0) has an IP address on each subnet used by the multi‑
pathed storage.
Ensure that for each path to the storage, you have a NIC and that there is an IP address config‑
ured on each NIC. For example, if you want four paths to your storage, you must have four NICs
that each have an IP address configured.
• For iSCSI only, every iSCSI target and initiator has a unique IQN.
• For iSCSI only, the iSCSI target ports are operating in portal mode.
• For HBA only, multiple HBAs are connected to the switch fabric.
We recommend that you enable multipathing for all hosts in your pool before creating the SR. If you
create the SR before enabling multipathing, you must put your hosts into maintenance mode to en‑
able multipathing.
1 xe pbd-unplug uuid=<pbd_uuid>
You can use the command xe pbd-list to find the UUID of the PBDs.
3. Set the value of the multipathing parameter to true by using the following command:
4. If there are existing SRs on the hosts running in single path mode that have multiple paths:
• Migrate or suspend any running guests with virtual disks in the affected SRs.
• Replug the PBD of any affected SRs to reconnect them using multipathing:
1 xe pbd-plug uuid=<pbd_uuid>
Ensure that you enable multipathing on all hosts in the pool. All cabling and, in the case of iSCSI,
subnet configurations must match the corresponding NICs on each host.
7. Create a GFS2 SR
Create your shared GFS2 SR on an iSCSI or an HBA LUN that is visible to all XenServer hosts in your
resource pool. We do not recommend using a thin‑provisioned LUN with GFS2. However, if you do
choose this configuration, you must ensure that the LUN always has enough space to allow XenServer
to write to it.
If you have previously used your block‑based storage device for thick provisioning with LVM, this is
detected by XenServer. XenCenter gives you the opportunity to use the existing LVM partition or to
format the disk and set up a GFS2 partition.
You can create GFS2 over iSCSI SRs by using XenCenter. For more information, see Software iSCSI
storage in the XenCenter product documentation.
Alternatively, you can use the xe CLI to create a GFS2 over iSCSI SR.
You can find the values to use for these parameters by using the xe sr-probe-ext command.
The output from the command prompts you to supply additional parameters and gives a list of
possible values at each step.
3. When the command output starts with Found the following complete configurations
that can be used to create SRs:, you can locate the SR by using the xe sr-
create command and the device-config parameters that you specified.
Example output:
To create a shared GFS2 SR on a specific LUN of an iSCSI target, run the following command on a server
in your clustered pool:
If the iSCSI target is not reachable while GFS2 filesystems are mounted, some hosts in the clustered
pool might hard restart (fence).
For more information about working with iSCSI SRs, see Software iSCSI support.
You can create GFS2 over HBA SRs by using XenCenter. For more information, see Hardware HBA stor‑
age in the XenCenter product documentation.
Alternatively, you can use the xe CLI to create a GFS2 over HBA SR.
You can find the values to use for the SCSIid parameter by using the xe sr-probe-ext com‑
mand.
The output from the command prompts you to supply additional parameters and gives a list of
possible values at each step.
3. When the command output starts with Found the following complete configurations
that can be used to create SRs:, you can locate the SR by using the xe sr-
create command and the device-config parameters that you specified.
Example output:
To create a shared GFS2 SR on a specific LUN of an HBA target, run the following command on a server
in your clustered pool:
For more information about working with HBA SRs, see Hardware host bus adapters.
What’s next?
Now that you have your GFS2 environment set up, it is important that you maintain the stability of
your clustered pool by ensuring it has quorum. For more information, see Manage your clustered
pool.
If you encounter issues with your GFS2 environment, see Troubleshoot clustered pools.
You can manage your GFS2 SR the same way as you do other SRs. For example, you can add capacity
to the storage array to increase the size of the LUN. For more information, see Live LUN expansion.
Constraints
• As with any thin‑provisioned SR, if the GFS2 SR usage grows to 100%, further writes from VMs fail.
These failed writes can then lead to failures within the VM, possible data corruption, or both.
• XenCenter shows an alert when your SR usage grows to 80%. Ensure that you monitor your
GFS2 SR for this alert and take the appropriate action if seen. On a GFS2 SR, high usage causes
a performance degradation. We recommend that you keep your SR usage below 80%.
• VM migration with storage migration (live or offline) is not supported for VMs whose VDIs are on
a GFS2 SR. You also cannot migrate VDIs from another type of SR to a GFS2 SR.
• The Software FCoE transport is not supported with GFS2 SRs (for
fully offloaded FCoE use HBA).
• Changed block tracking is not supported for VDIs stored on GFS2 SRs.
• You cannot export VDIs that are greater than 2 TiB as VHD or OVA/OVF. However, you can export
VMs with VDIs larger than 2 TiB in XVA format.
• We do not recommend using a thin‑provisioned LUN with GFS2. However, if you do choose this
configuration, you must ensure that the LUN always has enough space to allow XenServer to
write to it.
• We do not recommend using SAN deduplication with GFS2 SRs. However, if you do choose this
configuration, you must use suitable external monitoring of your SAN utilization to ensure that
there is always space for XenServer to write to.
• For cluster traffic, we strongly recommend that you use a bonded network that uses at least two
different network switches. Do not use this network for any other purposes.
• Changing the IP address of the cluster network by using XenCenter requires clustering and GFS2
to be temporarily disabled.
• Do not change the bonding of your clustering network while the cluster is live and has running
VMs. This action can cause hosts in the cluster to hard restart (fence).
• If you have an IP address conflict (multiple hosts having the same IP address) on your clustering
network involving at least one host with clustering enabled, the cluster does not form correctly
and the hosts are unable to fence when required. To fix this issue, resolve the IP address conflict.
April 8, 2024
This section covers creating storage repository types and making them available to your XenServer
host. It also covers various operations required in the ongoing management of Storage Repositories
(SRs), including Live VDI Migration.
This section explains how to create Storage Repositories (SRs) of different types and make them avail‑
able to your XenServer host. The examples provided cover creating SRs using the xe CLI. For details
on using the New Storage Repository wizard to add SRs using XenCenter, see the XenCenter docu‑
mentation.
Note:
Local SRs of type lvm, ext, and xfs can only be created using the xe CLI. After creation, you can
manage all SR types by either XenCenter or the xe CLI.
There are two basic steps to create a storage repository for use on a host by using the CLI:
2. Create the SR to initialize the SR object and associated PBD objects, plug the PBDs, and activate
the SR.
These steps differ in detail depending on the type of SR being created. In all examples, the sr-
create command returns the UUID of the created SR if successful.
SRs can be destroyed when no longer in use to free up the physical device. SRs can also be forgotten to
detach the SR from one XenServer host and attach it to another. For more information, see Removing
SRs in the following section.
Probe an SR
In both cases sr-probe works by specifying an SR type and one or more device-config parame‑
ters for that SR type. If an incomplete set of parameters is supplied, the sr-probe command returns
an error message indicating parameters are missing and the possible options for the missing parame‑
ters. When a complete set of parameters is supplied, a list of existing SRs is returned. All sr-probe
output is returned as XML.
For example, a known iSCSI target can be probed by specifying its name or IP address. The set of IQNs
available on the target is returned:
Probing the same target again and specifying both the name/IP address and desired IQN returns the
set of SCSIids (LUNs) available on the target/IQN.
3
4 Error code: SR_BACKEND_FAILURE_107
5 Error parameters: , The SCSIid parameter is missing or incorrect, \
6 <?xml version="1.0" ?>
7 <iscsi-target>
8 <LUN>
9 <vendor>
10 IET
11 </vendor>
12 <LUNid>
13 0
14 </LUNid>
15 <size>
16 42949672960
17 </size>
18 <SCSIid>
19 149455400000000000000000002000000b70200000f000000
20 </SCSIid>
21 </LUN>
22 </iscsi-target>
Probing the same target and supplying all three parameters returns a list of SRs that exist on the LUN,
if any.
The device-config
parameters, in order of Required for
SR type dependency Can be probed? sr-create?
The device-config
parameters, in order of Required for
SR type dependency Can be probed? sr-create?
chappassword No No
targetIQN Yes Yes
SCSIid Yes Yes
lvmohba SCSIid Yes Yes
lvmofcoe SCSIid Yes Yes
nfs server No Yes
serverpath Yes Yes
smb server No Yes
username No No
password No No
lvm device No Yes
ext device No Yes
For information about probing a GFS2 SR, see Create a GFS2 SR.
Remove SRs
Detach: Breaks the association between the storage device and the pool or host (PBD Unplug). The
SR (and its VDIs) becomes inaccessible. The contents of the VDIs and the meta‑information used by
VMs to access the VDIs are preserved. Detach can be used when you temporarily take an SR offline, for
example, for maintenance. A detached SR can later be reattached.
Forget: Preserves the contents of the SR on the physical disk, but the information that connects a VM
to its VDIs is permanently deleted. For example, allows you to reattach the SR, to another XenServer
host, without removing any of the SR contents.
Note:
When using SMB storage, do not remove the share from the storage before detaching the SMB
SR.
For Destroy or Forget, the PBD connected to the SR must be unplugged from the host.
1. Unplug the PBD to detach the SR from the corresponding XenServer host:
1 xe pbd-unplug uuid=pbd_uuid
2. Use the sr-destroy command to remove an SR. The command destroys the SR, deletes the
SR and corresponding PBD from the XenServer host database and deletes the SR contents from
the physical disk:
1 xe sr-destroy uuid=sr_uuid
3. Use the sr-forget command to forget an SR. The command removes the SR and correspond‑
ing PBD from the XenServer host database but leaves the actual SR content intact on the physi‑
cal media:
1 xe sr-forget uuid=sr_uuid
Note:
It can take some time for the software object corresponding to the SR to be garbage collected.
Introduce an SR
To reintroduce a previously forgotten SR, create a PBD. Manually plug the PBD to the appropriate
XenServer hosts to activate the SR.
2. Introduce the existing SR UUID returned from the sr-probe command. The UUID of the new
SR is returned:
3. Create a PBD to accompany the SR. The UUID of the new PBD is returned:
4 device-config:SCSIid=149455400000000000000000002000000
b70200000f000000
1 xe pbd-plug uuid=pbd_uuid
5. Verify the status of the PBD plug. If successful, the currently-attached property is true:
1 xe pbd-list sr-uuid=sr_uuid
Note:
Perform steps 3 through 5 for each host in the resource pool. These steps can also be performed
using the Repair Storage Repository function in XenCenter.
To fulfill capacity requirements, you may need to add capacity to the storage array to increase the size
of the LUN provisioned to the XenServer host. Live LUN Expansion allows to you to increase the size
of the LUN without any VM downtime.
1 xe sr-scan sr-uuid=sr_uuid
This command rescans the SR, and any extra capacity is added and made available.
This operation is also available in XenCenter. Select the SR to resize, and then click Rescan.
Warnings:
• It is not possible to shrink or truncate LUNs. Reducing the LUN size on the storage array can
lead to data loss.
Live VDI migration allows the administrator to relocate the VMs Virtual Disk Image (VDI) without shut‑
ting down the VM. This feature enables administrative operations such as:
1. In the Resources pane, select the SR where the Virtual Disk is stored and then click the Storage
tab.
2. In the Virtual Disks list, select the Virtual Disk that you would like to move, and then click Move.
3. In the Move Virtual Disk dialog box, select the target SR that you would like to move the VDI to.
Note:
Ensure that the SR has sufficient space for another virtual disk: the available space is
shown in the list of available SRs.
VDIs associated with a VM can be copied from one SR to another to accommodate maintenance re‑
quirements or tiered storage configurations. XenCenter enables you to copy a VM and all of its VDIs to
the same or a different SR. A combination of XenCenter and the xe CLI can be used to copy individual
VDIs.
The XenCenter Copy VM function creates copies of all VDIs for a selected VM on the same or a different
SR. The source VM and VDIs are not affected by default. To move the VM to the selected SR rather than
creating a copy, select the Remove original VM option in the Copy Virtual Machine dialog box.
A combination of the xe CLI and XenCenter can be used to copy individual VDIs between SRs.
2. Use the xe CLI to identify the UUIDs of the VDIs to be moved. If the VM has a DVD drive, its vdi
-uuid is listed as not in database and can be ignored.
1 xe vbd-list vm-uuid=valid_vm_uuid
Note:
The vbd-list command displays both the VBD and VDI UUIDs. Be sure to record the VDI
UUIDs rather than the VBD UUIDs.
3. In XenCenter, select the VM Storage tab. For each VDI to be moved, select the VDI and click the
Detach button. This step can also be done using the vbd-destroy command.
Note:
If you use the vbd-destroy command to detach the VDI UUIDs, first check if the VBD has
the parameter other-config:owner set to true. Set this parameter to false. Issu‑
ing the vbd-destroy command with other-config:owner=true also destroys the
associated VDI.
4. Use the vdi-copy command to copy each of the VM VDIs to be moved to the desired SR.
5. In XenCenter, select the VM Storage tab. Click the Attach button and select the VDIs from the
new SR. This step can also be done use the vbd-create command.
6. To delete the original VDIs, select the Storage tab of the original SR in XenCenter. The original
VDIs are listed with an empty value for the VM field. Use the Delete button to delete the VDI.
Use the xe CLI and the XenCenter Repair Storage Repository feature to convert a local FC SR to a
shared FC SR:
2. Ensure that all hosts in the pool have the SR’s LUN zoned appropriately. See Probe an SR for
details on using the sr-probe command to verify that the LUN is present on each host.
4. The SR is moved from the host level to the pool level in XenCenter, indicating that it is now
shared. The SR is marked with a red exclamation mark to show that it is not currently plugged
on all hosts in the pool.
5. Select the SR and then select the Storage > Repair Storage Repository option.
6. Click Repair to create and plug a PBD for each host in the pool.
Reclaim space for block‑based storage on the backing array using discard
You can use space reclamation to free up unused blocks on a thinly provisioned LUN. After the space
is released, the storage array can then reuse this reclaimed space.
Note:
Space reclamation is only available on some types of storage arrays. To determine whether your
array supports this feature and whether it needs a specific configuration, see the Hardware Com‑
patibility List and your storage vendor specific documentation.
1. Select the Infrastructure view, and then choose the host or pool connected to the SR.
2. Click the Storage tab.
3. Select the SR from the list, and click Reclaim freed space.
4. Click Yes to confirm the operation.
5. Click Notifications and then Events to view the status of the operation.
For more information, press F1in XenCenter to access the Online Help.
To reclaim space by using the xe CLI, you can use the following command:
1 xe host-call-plugin host-uuid=host_uuid \
2 plugin=trim fn=do_trim args:sr_uuid=sr_uuid
Notes:
• The operation is only available for LVM‑based SRs that are based on thinly provisioned LUNs
on the array. Local SSDs can also benefit from space reclamation.
• Space reclamation is not required for file‑based SRs such as NFS and EXT3/EXT4. The Re‑
claim Freed Space button is not available in XenCenter for these SR types.
• If you run the space reclamation xe command for a file‑based SR or a thick‑provisioned LVM‑
based SR, the command returns an error.
• Space reclamation is an intensive operation and can lead to a degradation in storage array
performance. Therefore, only initiate this operation when space reclamation is required on
the array. We recommend that you schedule this work outside of peak array demand hours.
When deleting snapshots with XenServer, space allocated on LVM‑based SRs is reclaimed automati‑
cally and a VM reboot is not required. This operation is known as ‘online coalescing’. Online coalesc‑
ing applies to all types of SR.
In certain cases, automated space reclamation might be unable to proceed. We recommend that you
use the offline coalesce tool in these scenarios:
Notes:
• Running the offline coalesce tool incurs some downtime for the VM, due to the suspend/re‑
sume operations performed.
• Before running the tool, delete any snapshots and clones you no longer want. The tool
reclaims as much space as possible given the remaining snapshots/clones. If you want to
reclaim the entire space, delete all snapshots and clones.
• VM disks must be either on shared or local storage for a single host. VMs with disks in both
types of storage cannot be coalesced.
Enable the hidden objects using XenCenter. Click View > Hidden objects. In the Resource pane, select
the VM for which you want to obtain the UUID. The UUID is displayed in the General tab.
In the Resource pane, select the resource pool coordinator (the first host in the list). The General tab
displays the UUID. If you are not using a resource pool, select the VM’s host.
1 xe host-call-plugin host-uuid=host-UUID \
2 plugin=coalesce-leaf fn=leaf-coalesce args:vm_uuid=VM-UUID
1 xe host-call-plugin host-uuid=b8722062-de95-4d95-9baa-a5fe343898ea
\
2. This command suspends the VM (unless it is already powered down), initiates the space recla‑
mation process, and then resumes the VM.
Notes:
We recommend that you shut down or suspend the VM manually before running the off‑line co‑
alesce tool. You can shut down or suspend the VM using either XenCenter or the XenServer CLI.
If you run the coalesce tool on a running VM, the tool automatically suspends the VM, performs
the required VDI coalesce operations, and resumes the VM. Agile VMs might restart on a different
host.
If the Virtual Disk Images (VDIs) to be coalesced are on shared storage, you must run the off‑line
coalesce tool on the pool coordinator.
If the VDIs to be coalesced are on local storage, run the off‑line coalesce tool on the host to which
the local storage is attached.
You can configure the disk I/O scheduler and the disk I/O priority settings to change the performance
of your disks.
Note:
The disk I/O capabilities described in this section do not apply to EqualLogic, NetApp, or NFS
storage.
For general performance, the default disk scheduler noop is applied on all new SR types. The noop
scheduler provides the fairest performance for competing VMs accessing the same device.
The value of <option> can be one of the following terms: noop, cfq, or deadline.
2. Unplug and replug the corresponding PBD for the scheduler parameter to take effect.
1 xe pbd-unplug uuid=<pbd_uuid>
2 xe pbd-plug uuid=<pbd_uuid>
To apply disk I/O request prioritization, override the default setting and assign the cfq disk scheduler
to the SR.
Virtual disks have optional I/O request priority settings. You can use these settings to prioritize I/O to
a particular VM’s disk over others.
Before configuring any disk I/O request priority parameters for a VBD, ensure that the disk scheduler
for the SR has been set appropriately. The scheduler parameter must be set to cfq on the SR and the
associated PBD unplugged and replugged. For information about how to adjust the scheduler, see
Adjusting the disk I/O scheduler.
For shared SR, where multiple hosts are accessing the same LUN, the priority setting is applied to VBDs
accessing the LUN from the same host. These settings are not applied across hosts in the pool.
The host issues a request to the remote storage, but the request prioritization is done by the remote
storage.
Setting disk I/O request parameters These settings can be applied to existing virtual disks by using
the xe vbd-param-set command with the following parameters:
• qos_algorithm_type ‑ This parameter must be set to the value ionice, which is the only
algorithm supported for virtual disks.
• qos_algorithm_param ‑ Use this parameter to set key/value pairs. For virtual disks,
qos_algorithm_param takes a sched key, and depending on the value, also requires a
class key.
– sched=idle ‑ This value sets the scheduling parameter to idle priority, which requires
no class parameter to set any value.
– An integer between 0 and 7, where 7 is the highest priority and 0 is the lowest. For example,
I/O requests with a priority of 5, are given priority over I/O requests with a priority of 2.
Example For example, the following CLI commands set the virtual disk’s VBD to use real time prior‑
ity 5:
Storage multipathing
Dynamic multipathing support is available for Fibre Channel and iSCSI storage back‑ends.
XenServer uses Linux native multipathing (DM‑MP), the generic Linux multipathing solution, as its
multipath handler. However, XenServer supplements this handler with additional features so that
XenServer can recognize vendor‑specific features of storage devices.
Configuring multipathing provides redundancy for remote storage traffic if there is partial connectiv‑
ity loss. Multipathing routes storage traffic to a storage device over multiple paths for redundancy and
increased throughput. You can use up to 16 paths to a single LUN. Multipathing is an active‑active con‑
figuration. By default, multipathing uses either round‑robin or multibus load balancing depending on
the storage array type. All routes have active traffic on them during normal operation, which results
in increased throughput.
Important:
We recommend that you enable multipathing for all hosts in your pool before creating the SR.
If you create the SR before enabling multipathing, you must put your hosts into maintenance
mode to enable multipathing.
NIC bonding can also provide redundancy for storage traffic. For iSCSI storage, we recommend con‑
figuring multipathing instead of NIC bonding whenever possible.
In these cases, consider using NIC bonding instead. For more information about NIC bonding, see
Networking.
Prerequisites
Before enabling multipathing, verify that the following statements are true:
For example, an iSCSI storage back‑end queried for sendtargets on a given portal returns
multiple targets, as in the following example:
However, you can perform additional configuration to enable iSCSI multipath for arrays that
only expose a single target. For more information, see iSCSI multipath for arrays that only ex‑
pose a single target.
• For iSCSI only, the control domain (dom0) has an IP address on each subnet used by the multi‑
pathed storage.
Ensure that for each path you want to have to the storage, you have a NIC and that there is an IP
address configured on each NIC. For example, if you want four paths to your storage, you must
have four NICs that each have an IP address configured.
• For iSCSI only, every iSCSI target and initiator has a unique IQN.
• For iSCSI only, the iSCSI target ports are operating in portal mode.
• For HBA only, multiple HBAs are connected to the switch fabric.
• When you are configuring secondary interfaces, each secondary interface must be on a separate
subnet. For example, if you want to configure two more secondary interfaces for storage, you
require IP addresses on three different subnets –one subnet for the management interface, one
subnet for Secondary Interface 1, and one subnet for Secondary Interface 2.
This diagram shows how both NICs on the host in a multipathed iSCSI configuration must be
on different subnets. In this diagram, NIC 1 on the host along with Switch 1 and NIC 1 on both
storage controllers are on a different subnet than NIC2, Switch 2, and NIC 2 on the storage con‑
trollers.
Enable multipathing
1. In the XenCenter Resources pane, right‑click on the host and choose Enter Maintenance Mode.
2. Wait until the host reappears in the Resources pane with the maintenance mode icon (a blue
square) before continuing.
3. On the General tab for the host, click Properties and then go to the Multipathing tab.
4. To enable multipathing, select the Enable multipathing on this server check box.
5. Click OK to apply the new setting. There is a short delay while XenCenter saves the new storage
configuration.
6. In the Resources pane, right‑click on the host and choose Exit Maintenance Mode.
Ensure that you enable multipathing on all hosts in the pool. All cabling and, in the case of iSCSI,
subnet configurations must match the corresponding NICs on each host.
1 xe pbd-unplug uuid=<pbd_uuid>
You can use the command xe pbd-list to find the UUID of the PBDs.
3. Set the value of the multipathing parameter to true by using the following command:
4. If there are existing SRs on the server running in single path mode but that have multiple paths:
• Migrate or suspend any running guests with virtual disks in affected the SRs
• Replug the PBD of any affected SRs to reconnect them using multipathing:
1 xe pbd-plug uuid=<pbd_uuid>
Ensure that you enable multipathing on all hosts in the pool. All cabling and, in the case of iSCSI,
subnet configurations must match the corresponding NICs on each host.
Disable multipathing
1. In the XenCenter Resources pane, right‑click on the host and choose Enter Maintenance Mode.
2. Wait until the host reappears in the Resources pane with the maintenance mode icon (a blue
square) before continuing.
3. On the General tab for the host, click Properties and then go to the Multipathing tab.
4. To disable multipathing, clear the Enable multipathing on this server check box.
5. Click OK to apply the new setting. There is a short delay while XenCenter saves the new storage
configuration.
6. In the Resources pane, right‑click on the host and choose Exit Maintenance Mode.
1 xe pbd-unplug uuid=<pbd_uuid>
You can use the command xe pbd-list to find the UUID of the PBDs.
3. Set the value of the multipathing parameter to false by using the following command:
4. If there are existing SRs on the server running in single path mode but that have multiple paths:
• Migrate or suspend any running guests with virtual disks in affected the SRs
• Unplug and replug the PBD of any affected SRs to reconnect them using multipathing:
1 xe pbd-plug uuid=<pbd_uuid>
Configure multipathing
To make additional temporary multipath configuration modifications, create files with the suffix .
conf in the directory /etc/multipath/conf.d. Add the additional configuration in these files.
Multipath searches the directory alphabetically for files ending in .conf and reads configuration in‑
formation from them.
Do not edit the file /etc/multipath.conf. This file is overwritten by updates to XenServer. If you
want to make permanent changes to your multipathing configuration, contact your storage vendor
who can request our partner engineering team to have the changes permanently added.
You can configure XenServer to use iSCSI multipath with storage arrays that expose their targets and
IQN(s) on a single subnet. For example, you can follow these steps to set up Dell EqualLogic PS and
FS unified series storage arrays.
By default, XenServer establishes only one connection per iSCSI target. Hence, with the default con‑
figuration the recommendation is to use NIC bonding to achieve failover and load balancing. The con‑
figuration procedure outlined in this section describes an alternative configuration, where multiple
iSCSI connections are established for a single subnet or target. NIC bonding is not required.
Note:
The following configuration is only supported for servers that are exclusively attached to storage
arrays which expose their targets and IQN(s) through a single subnet. These storage arrays must
be qualified for this procedure with XenServer.
To configure multipath:
2. In the XenCenter Resources pane, right‑click on the host and choose Enter Maintenance Mode.
3. Wait until the host reappears in the Resources pane with the maintenance mode icon (a blue
square) before continuing.
4. On the General tab for the host, click Properties and then go to the Multipathing tab.
5. To enable multipathing, select the Enable multipathing on this server check box.
6. Click OK to apply the new setting. There is a short delay while XenCenter saves the new storage
configuration.
7. In the host console, configure two to four Open‑iSCSI interfaces. Each iSCSI interface is used to
establish a separate path. The following steps show the process for two interfaces:
Ensure that the interface names have the prefix c_. If the interfaces do not use this naming
standard, they are ignored and instead the default interface is used.
Note:
This configuration leads to the default interface being used for all connections. This
indicates that all connections are being established using a single interface.
b) Bind the iSCSI interfaces to xenbr1 and xenbr2, by using the following commands:
Note:
This configuration assumes that the network interfaces configured for the control do‑
main (including xenbr1 and xenbr2) and xenbr0 are used for management. It also
assumes that the NIC cards being used for the storage network are NIC1 and NIC2.
If this is not the case, refer to your network topology to discover the network inter‑
faces and NIC cards to use in these commands.
8. In the XenCenter Resources pane, right‑click on the host and choose Exit Maintenance Mode.
Do not resume your VMs yet.
9. In the host console, run the following commands to discover and log in to the sessions:
10. Delete the stale entries containing old session information by using the following commands:
11. Detach the LUN and attach it again. You can do this in one of the following ways:
• After completing the preceding steps on all hosts in a pool, you can use XenCenter to de‑
tach and reattach the LUN for the entire pool.
• Alternatively, you can unplug and destroy the PBD for each host and then repair the SR.
1 xe sr-list
1 xe pbd-list sr-uuid=<sr_uuid>
iii. In the output of the previous command, look for the UUID of the PBD of the iSCSI
Storage Repository with a mismatched SCSI ID.
1 xe pbd-unplug uuid=<pbd_uuid>
2 xe pbd-destroy uuid=<pbd_uuid>
Read caching improves a VM’s disk performance as, after the initial read from external disk, data is
cached within the host’s free memory. It improves performance in situations where many VMs are
cloned off a single base VM, as it drastically reduces the number of blocks read from disk. For example,
in Citrix Virtual Desktops environment Machine Creation Services (MCS) environments.
The performance improvement can be seen whenever data is read from disk more than once, as it gets
cached in memory. This change is most noticeable in the degradation of service that occurs during
heavy I/O situations. For example, in the following situations:
• When a significant number of end users boot up within a very narrow time frame (boot storm)
• When a significant number of VMs are scheduled to run malware scans at the same time (an‑
tivirus storms).
Read caching is enabled by default when you have the appropriate license type.
Note:
For file‑based SRs, such as NFS, EXT3/EXT4, SMB, and GFS2 SR types, read‑caching is enabled by de‑
fault. Read‑caching is disabled for all other SRs.
To disable read caching for a specific SR by using the xe CLI, run the following command:
To disable read caching for a specific SR by using XenCenter, go to the Properties dialog for the SR. In
the Read Caching tab, you can select to enable or disable read caching.
Limitations
• Read caching is available only for NFS, EXT3/EXT4, SMB, and GFS2 SRs. It is not available for
other SR types.
• Read caching only applies to read‑only VDIs and VDI parents. These VDIs exist where VMs are
created from ‘Fast Clone’or disk snapshots. The greatest performance improvements can be
seen when many VMs are cloned from a single ‘golden’image.
• Performance improvements depend on the amount of free memory available in the host’s Con‑
trol Domain (dom0). Increasing the amount of dom0 memory allows more memory to be allo‑
cated to the read‑cache. For information on how to configure dom0 memory, see CTX220763.
• When memory read caching is turned on, a cache miss causes I/O to become serialized. This can
sometimes be more expensive than having read caching turned off, because with read caching
turned off I/O can be parallelized. To reduce the impact of cache misses, increase the amount
of available dom0 memory or disable read caching for the SR.
IntelliCache and memory based read caching are to some regards complementary. IntelliCache not
only caches on a different tier, but it also caches writes in addition to reads. IntelliCache caches reads
from the network onto a local disk. In‑memory read caching caches the reads from network or disk
into host memory. The advantage of in‑memory read caching, is that memory is still an order of mag‑
nitude faster than a solid‑state disk (SSD). Performance in boot storms and other heavy I/O situations
improves.
Both read‑caching and IntelliCache can be enabled simultaneously. In this case, IntelliCache caches
the reads from the network to a local disk. Reads from that local disk are cached in memory with read
caching.
The read cache performance can be optimized, by giving more memory to XenServer’s control domain
(dom0).
Important:
Set the read cache size on ALL hosts in the pool individually for optimization. Any subsequent
changes to the size of the read cache must also be set on all hosts in the pool.
To set the size of the read cache, run the following command:
Set both the initial and maximum values to the same value. For example, to set dom0 memory to
20,480 MiB:
Important:
1 free -m
The output of free -m shows the current dom0 memory settings. The value may be less than ex‑
pected due to various overheads. The example table below shows the output from a host with dom0
set to 2.6 GiB
What Range of Values Can be Used? As the XenServer Control Domain (dom0) is 64‑bit, large values
can be used, for example 32,768 MiB. However, we recommend that you do not reduce the dom0
memory below 1 GiB.
The entire host’s memory can be considered to comprise the Xen hypervisor, dom0, VMs, and free
memory. Even though dom0 and VM memory is usually of a fixed size, the Xen hypervisor uses a
variable amount of memory. The amount of memory used depends on various factors. These factors
include the number of VMs running on the host at any time and how those VMs are configured. It is not
possible to limit the amount of memory that Xen uses. Limiting the amount of memory can cause Xen
to run out of memory and prevent new VMs from starting, even when the host had free memory.
To view the memory allocated to a host, in XenCenter select the host, and then click the Memory
tab.
The XenServer field displays the sum of the memory allocated to dom0 and Xen memory. Therefore,
the amount of memory displayed might be higher than specified by the administrator. The memory
size can vary when starting and stopping VMs, even when the administrator has set a fixed size for
dom0.
Graphics overview
August 5, 2024
This section provides an overview of the virtual delivery of 3D professional graphics applications and
workstations in XenServer. The offerings include GPU Pass‑through (for NVIDIA, AMD, and Intel GPUs)
and hardware‑based GPU sharing with NVIDIA vGPU™.
Graphics Virtualization is available for XenServer Premium Edition customers. To learn more about
XenServer editions, and to find out how to upgrade, visit the XenServer website. For more information,
see Licensing.
GPU pass‑through
In a virtualized system, most of the physical system components are shared. These components are
represented as multiple virtual instances to multiple clients by the hypervisor. A pass‑through GPU is
not abstracted at all, but remains one physical device. Each hosted virtual machine (VM) gets its own
dedicated GPU, eliminating the software abstraction and the performance penalty that goes with it.
XenServer allows you to assign a physical GPU (in the XenServer host) to a Windows or Linux VM run‑
ning on the same host. This GPU pass‑through feature is intended for graphics power users, such as
CAD designers.
Shared GPU (vGPU) allows one physical GPU to be used by multiple VMs concurrently. Because a
portion of a physical GPU is used, performance is greater than emulated graphics, and there is no need
for one card per VM. This feature enables resource optimization, boosting the performance of the VM.
The graphics commands of each virtual machine are passed directly to the GPU, without translation
by the hypervisor.
Multiple vGPU enables multiple virtual GPUs to be used concurrently by a single VM. Only certain vGPU
profiles can be used and all vGPUs attached to a single VM must be of the same type. These additional
vGPUs can be used to perform computational processing. For more information about the number of
vGPUs supported for a single VM, see Configuration Limits.
This feature is only available for NVIDIA GPUs. For more information about the physical GPUs that
support the multiple vGPU feature, see the NVIDIA documentation.
Vendor support
The following table lists guest support for the GPU pass‑through, shared GPU (vGPU), and multiple
shared GPU (vGPU) features:
Multiple
GPU pass‑ Shared GPU shared GPU Multiple
through for GPU pass‑ (vGPU) for Shared GPU (vGPU) for shared GPU
Windows through for Windows (vGPU) for Windows (vGPU) for
VMs Linux VMs VMs Linux VMs VMs Linux VMs
AMD YES
Intel YES YES (depre‑
cated)
NVIDIA YES YES YES YES YES (see YES (see
note) note)
Note:
• Only some of the guest operating systems support multiple vGPU. For more information,
see Guest support and constraints.
• Only some of the guest operating systems support vGPU live migration. For more informa‑
tion, see Vendor support.
You might need a vendor subscription or a license depending on the graphics card used.
vGPU live migration enables a VM that uses a virtual GPU to perform live migration, storage live migra‑
tion, or VM suspend. VMs with vGPU live migration capabilities can be migrated to avoid downtime.
vGPU live migration also enables you to perform rolling pool upgrades on pools that host vGPU‑
enabled VMs. For more information, see Rolling pool upgrades.
To use vGPU live migration or VM suspend, your VM must run on a graphics card that supports this
feature. Your VM must also have the supported drivers from the GPU vendor installed.
Warning:
The size of the GPU state in the NVIDIA driver can cause a downtime of 5 seconds or more during
vGPU live migration.
• VMs must have the appropriate vGPU drivers installed to be supported with any vGPU live mi‑
gration features. The in‑guest drivers must be installed for all guests using the vGPU feature.
• Reboot and shutdown operations on a VM are not supported while a migration is in progress.
These operations can cause the migration to fail.
• Linux VMs are not supported with any vGPU live migration features.
• Live migration by the Workload Balancing appliance is not supported for vGPU‑enabled VMs.
The Workload Balancing appliance cannot do capacity planning for VMs that have a vGPU at‑
tached.
• After migrating a VM using vGPU live migration, the guest VNC console might become corrupted.
Use ICA, RDP, or another network‑based method for accessing VMs after a vGPU live migration
has been performed.
• VDI migration uses live migration, therefore requires enough vGPU space on the host to make a
copy of the vGPU instance on the host. If the physical GPUs are fully used, VDI migration might
not be possible.
Vendor support
Multiple
GPU pass‑ Shared GPU shared GPU Multiple
through for GPU pass‑ (vGPU) for Shared GPU (vGPU) for shared GPU
Windows through for Windows (vGPU) for Windows (vGPU) for
VMs Linux VMs VMs Linux VMs VMs Linux VMs
For more information about the graphics cards that support this feature, see the vendor‑specific sec‑
tions of this guide. Customers might need a vendor subscription or a license depending on the graph‑
ics card used.
XenServer supports the following guest operating systems for virtual GPUs.
NVIDIA vGPU
Operatings systems marked with an asterisk (*) also support multiple vGPU.
Windows guests:
• Windows 10 (64‑bit) *
• Windows 11 (64‑bit) *
• Windows Server 2016 (64‑bit) *
• Windows Server 2019 (64‑bit) *
• Windows Server 2022 (64‑bit) *
Linux guests:
• RHEL 7 *
• RHEL 8 *
• RHEL 9 *
• CentOS 7
• CentOS Stream 9
• Ubuntu 18.04 * (deprecated)
• Ubuntu 20.04 *
• Ubuntu 22.04 *
• Rocky Linux 8 *
• Rocky Linux 9 *
Constraints
• VMs with a virtual GPU are not supported with Dynamic Memory Control.
• XenServer automatically detects and groups identical physical GPUs across hosts in the same
pool. If assigned to a group of GPUs, a VM can be started on any host in the pool that has an
available GPU in the group.
• All graphics solutions (NVIDIA vGPU and vGPU pass‑through) can be used in an environment
that uses high availability. However, VMs that use these graphics solutions cannot be protected
with high availability. These VMs can be restarted on a best‑effort basis while there are hosts
with the appropriate free resources.
September 5, 2024
This section provides step‑by‑step instructions on how to prepare XenServer for supported graphical
virtualization technologies. The offerings include NVIDIA vGPU.
NVIDIA vGPU
NVIDIA vGPU enables multiple Virtual Machines (VM) to have simultaneous, direct access to a single
physical GPU. It uses NVIDIA graphics drivers deployed on non‑virtualized Operating Systems. NVIDIA
physical GPUs can support multiple virtual GPU devices (vGPUs). To provide this support, the physical
GPU must be under the control of NVIDIA Virtual GPU Manager running in XenServer Control Domain
(dom0). The vGPUs can be assigned directly to VMs.
VMs use virtual GPUs like a physical GPU that the hypervisor has passed through. An NVIDIA driver
loaded in the VM provides direct access to the GPU for performance critical fast paths. It also provides
a paravirtualized interface to the NVIDIA Virtual GPU Manager.
Important:
To ensure that you always have the latest security and functional fixes, ensure that you install the
latest NVIDIA vGPU software package for XenServer (consisting of the NVIDIA Virtual GPU Manager
for XenServer and NVIDIA drivers) and keep it updated to the latest version provided by NVIDIA.
For more information, see the NVIDIA documentation.
The latest NVIDIA drivers are available from the NVIDIA Application Hub.
NVIDIA vGPU is compatible with the HDX 3D Pro feature of Citrix Virtual Apps and Desktops or Citrix
DaaS. For more information, see HDX 3D Pro.
For more information about NVIDIA vGPUs, see the NVIDIA Documentation Hub.
Licensing note
NVIDIA vGPU is available for XenServer Premium Edition customers. To learn more about XenServer
editions, and to find out how to upgrade, visit the XenServer website. For more information, see Li‑
censing.
Depending on the NVIDIA graphics card used, you might need NVIDIA subscription or a license.
NVIDIA GRID cards contain multiple Graphics Processing Units (GPU). For example, TESLA M10 cards
contain four GM107GL GPUs, and TESLA M60 cards contain two GM204GL GPUs. Each physical GPU
can host several different types of virtual GPU (vGPU). vGPU types have a fixed amount of frame buffer,
number of supported display heads and maximum resolutions, and are targeted at different classes
of workload.
For a list of the most recently supported NVIDIA cards, see the Hardware Compatibility List and the
NVIDIA product information.
Note:
The vGPUs hosted on a physical GPU at the same time must all be of the same type. However,
there is no corresponding restriction for physical GPUs on the same card. This restriction is au‑
tomatic and can cause unexpected capacity planning issues.
– For a list of the most recently supported NVIDIA cards, see the Hardware Compatibility List
and the NVIDIA product information.
• Depending on the NVIDIA graphics card used, you might need an NVIDIA subscription or a li‑
cense. For more information, see the NVIDIA product information.
• Depending on the NVIDIA graphics card, you might need to ensure that the card is set to the
correct mode. For more information, see the NVIDIA documentation.
• NVIDIA vGPU software package for XenServer, consisting of the NVIDIA Virtual GPU Manager for
XenServer, and NVIDIA drivers.
Note:
Review the NVIDIA Virtual GPU software documentation available from the NVIDIA website.
Register with NVIDIA to access these components.
• To run Citrix Virtual Desktops with VMs running NVIDIA vGPU, you also need: Citrix Virtual Desk‑
tops 7.6 or later, full installation.
• For NVIDIA Ampere vGPUs and all future generations, you must enable SR‑IOV in your system
firmware.
XenServer enables the use of live migration, storage live migration, and the ability to suspend and
resume for NVIDIA vGPU‑enabled VMs.
To use the vGPU live migration, storage live migration, or Suspend features, satisfy the following re‑
quirements:
• An NVIDIA Virtual GPU Manager for XenServer with live migration enabled. For more informa‑
tion, see the NVIDIA Documentation.
vGPU live migration enables the use of live migration within a pool, live migration between pools,
storage live migration, and Suspend/Resume of vGPU‑enabled VMs.
Preparation overview
1. Install XenServer
Installation on XenServer
Licensing note
vGPU is available for XenServer Premium Edition customers. To learn more about XenServer editions,
and to find out how to upgrade, visit the XenServer website. For more information, see Licensing.
Depending on the NVIDIA graphics card used, you might need NVIDIA subscription or a license. For
more information, see NVIDIA product information.
For information about licensing NVIDIA cards, see the NVIDIA website.
Install the NVIDIA Virtual GPU software that is available from NVIDIA. The NVIDIA Virtual GPU software
consists of:
• Windows Display Driver (The Windows display driver depends on the Windows version)
The NVIDIA Virtual GPU Manager runs in the XenServer Control Domain (dom0). It is provided as
either a supplemental pack or an RPM file. For more information about installation, see the NVIDIA
virtual GPU Software documentation.
Important:
Do not install the NVIDIA Virtual GPU Manager supplemental pack as part of a fresh installation of
a XenServer host. After you have installed your hosts, you can install NVIDIA Virtual GPU Manager
by the following methods.
• Use XenCenter (Tools > Install Update > Select update or supplemental pack from disk)
• Use the xe CLI command xe-install-supplemental-pack.
Note:
If you are installing the NVIDIA Virtual GPU Manager using an RPM file, ensure that you copy the
RPM file to dom0 and then install.
1 shutdown -r now
3. After you restart the XenServer host, verify that the software has been installed and loaded cor‑
rectly by checking the NVIDIA kernel driver:
4. Verify that the NVIDIA kernel driver can successfully communicate with the NVIDIA physical GPUs
in your host. Run the nvidia-smi command to produce a listing of the GPUs in your platform
similar to:
22 +------------------------------------------------------------------------
Note:
When using NVIDIA vGPU with XenServer servers that have more than 768 GB of RAM, add
the parameter iommu=dom0-passthrough to the Xen command line:
XenServer supports the GPU pass‑through feature for Windows VMs using an Intel integrated GPU de‑
vice.
• For more information on Windows versions supported with Intel GPU pass‑through, see Graph‑
ics.
• For more information on supported hardware, see the Hardware Compatibility List.
When using Intel GPU on Intel servers, the XenServer server’s Control Domain (dom0) has access to the
integrated GPU device. In such cases, the GPU is available for pass‑through. To use the Intel GPU Pass‑
through feature on Intel servers, disable the connection between dom0 and the GPU before passing
through the GPU to the VM.
2. On the General tab, click Properties, and in the left pane, click GPU.
3. In the Integrated GPU passthrough section, select This server will not use the integrated
GPU.
This step disables the connection between dom0 and the Intel integrated GPU device.
4. Click OK.
The Intel GPU is now visible on the GPU type list during new VM creation, and on the VM’s Prop‑
erties tab.
Note:
The XenServer host’s external console output (for example, VGA, HDMI, DP) will not be
available after disabling the connection between dom0 and the GPU.
February 9, 2024
This section provides step‑by‑step instructions on how to create a virtual GPU or GPU pass‑through
enabled VM.
Note:
If you are using the Intel GPU Pass‑through feature, first see the section Enabling Intel GPU Pass‑
through for more configuration, and then complete the following steps.
1. Create a VM using XenCenter. Select the host on the Resources pane and then select New VM
on the VM menu.
2. Follow the instructions on the New VM configuration and select the Installation Media, Home
Server, and CPU & Memory.
4. Click Add. From the GPU Type list, select either Pass‑through whole GPU, or a virtual GPU
type.
If you want to assign multiple vGPUs to your VM, ensure that you select a vGPU type that sup‑
ports multiple vGPU. Repeat this step to add more vGPUs of the same type.
Without the optimized networking and storage drivers provided by the XenServer VM Tools, remote
graphics applications running on NVIDIA vGPU do not deliver maximum performance.
• If your VM is a Windows VM, you must install the XenServer VM Tools for Windows on your VM.
For more information, see Install XenServer VM Tools for Windows.
• If your VM is a Linux VM, you can install the XenServer VM Tools for Linux on your VM. For more
information, see Install XenServer VM Tools for Linux.
When viewing the VM console in XenCenter, the VM typically boots to the desktop in VGA mode with
800 x 600 resolution. The standard Windows screen resolution controls can be used to increase the
resolution to other standard resolutions. (Control Panel > Display > Screen Resolution)
Note:
When using GPU pass‑through, we recommend that you install the in‑guest drivers through RDP
or VNC over the network. That is, not through XenCenter.
To ensure that you always have the latest security and functional fixes, ensure that you always take
the latest updates to your in‑guest drivers.
To enable vGPU operation (as for a physical NVIDIA GPU), install NVIDIA drivers into the VM.
The following section provides an overview of the procedure. For detailed instructions, see the NVIDIA
virtual GPU Software documentation.
1. Start the VM. In the Resources pane, right‑click on the VM, and click Start.
During this start process, XenServer dynamically allocates a vGPU to the VM.
4. Install the appropriate driver for the GPU inside the guest. The following example shows the
specific case for in guest installation of the NVIDIA GRID drivers.
5. Copy the 64‑bit NVIDIA Windows driver package to the VM, open the zip file, and run setup.exe.
7. After the driver installation has completed, you might be prompted to reboot the VM. Select
Restart Now to restart the VM immediately, alternatively, exit the installer package, and restart
the VM when ready. When the VM starts, it boots to a Windows desktop.
8. To verify that the NVIDIA driver is running, right‑click on the desktop and select NVIDIA Control
Panel.
9. In the NVIDIA Control Panel, select System Information. This interface shows the GPU Type in
use by the VM, its features, and the NVIDIA driver version in use:
Note:
Depending on the NVIDIA graphics card used, you might need an NVIDIA subscription or a
The VM is now ready to run the full range of DirectX and OpenGL graphics applications supported by
the GPU.
In your Linux VM, install the driver as instructed by the NVIDIA User Guides.
If your Linux VM boots in UEFI Secure Boot mode, you might be required to take additional steps to
sign the driver. For more information, see Install third‑party drivers on your Secure Boot Linux VM.
1. Start the VM. In the Resources pane, right‑click on the VM, and click Start.
During this boot process, XenServer dynamically allocates a GPU to the VM.
4. Copy the 64‑bit Intel Windows driver (Intel Graphics Driver) to the VM.
7. To accept the License Agreement, click Yes, and on the Readme File Information screen, click
Next.
8. Wait until the setup operations complete. When you are prompted, click Next.
9. To complete the installation, you are prompted to restart the VM. Select Yes, I want to restart
this computer now, and click Finish.
10. After the VM restarts, check that graphics are working correctly. Open the Windows Device Man‑
ager, expand Display adapters, and ensure that the Intel Graphics Adapter does not have any
warning symbols.
Note:
You can obtain the latest drivers from the Intel website.
Memory usage
Two components contribute to the memory footprint of the XenServer host. First, the memory con‑
sumed by the Xen hypervisor itself. Second, there is the memory consumed by the Control Domain
of the host. Also known as ‘Domain0’, or ‘dom0’, the control domain is a secure, privileged Linux
VM that runs the XenServer management toolstack (XAPI). Besides providing XenServer management
functions, the control domain also runs the driver stack that provides user created VM access to phys‑
ical devices.
The amount of memory allocated to the control domain is adjusted automatically and is based on the
amount of physical memory on the physical host. By default, XenServer allocates 1 GiB plus 5% of
the total physical memory to the control domain, up to an initial maximum of 8 GiB.
Note:
The amount reported in the XenServer section in XenCenter includes the memory used by the
control domain (dom0), the Xen hypervisor itself, and the crash kernel. Therefore, the amount
of memory reported in XenCenter can exceed these values. The amount of memory used by the
hypervisor is larger for hosts using more memory.
You can change the amount of memory allocated to dom0 by using XenCenter or by using the com‑
mand line. If you increase the amount of memory allocated to the control domain beyond the amount
allocated by default, this action results in less memory being available to VMs.
You might need to increase the amount of memory assigned to the control domain of a XenServer
host in the following cases:
Important:
If you are using a GFS2 SR and any of these cases also applies to your environment, you must
increase the amount of control domain memory. Insufficient control domain memory can cause
network instability, which can cause problems for clustered pools with GFS2 SRs.
The amount of memory to allocate to the control domain depends on your environment and the re‑
quirements of your VMs.
You can monitor the following metrics to judge whether the amount of control domain memory is
appropriate for your environment and what effects any changes you make have:
• Swap activity: If the control domain is swapping, increase the control domain memory.
• Tapdisk mode: You can monitor whether your tapdisks are in low‑memory mode from within
the XenCenter Performance tab for the host. Select Actions > New Graph and choose the
Tapdisks in low memory mode graph. If a tapdisk is in low‑memory mode, increase the control
domain memory.
• Pagecache pressure: Use the top command to monitor the buff/cache metric. If this num‑
ber becomes too low, you might want to increase the control domain memory.
For information about changing the dom0 memory by using XenCenter, see Changing the Control
Domain Memory in the XenCenter documentation.
Note:
You cannot use XenCenter to reduce dom0 memory below the value that was initially set during
XenServer installation. To make this change you must use the command line.
Note:
On hosts with smaller memory (less than 16 GiB), you might want to reduce the memory allo‑
cated to the Control Domain to lower than the installation default value. You can use the com‑
mand line to make this change. However, we recommend that you do not reduce the dom0
memory below 1 GiB and that you do this operation under the guidance of the Support Team.
3. Restart the XenServer host using XenCenter or the reboot command on the XenServer con‑
sole.
When the host restarts, on the XenServer console, run the free command to verify the new
memory settings.
To find out how much host memory is available to be assigned to VMs, find the value of the free
memory of the host by running memory-free. Then type the command vm-compute-maximum
-memory to get the actual amount of free memory that can be allocated to the VM. For example:
XenServer provides detailed monitoring of performance metrics. These metrics include CPU, mem‑
ory, disk, network, C‑state/P‑state information, and storage. Where appropriate, these metrics are
available on a per host and a per VM basis. These metrics are available directly, or can be accessed
and viewed graphically in XenCenter or other third‑party applications.
XenServer also provides system and performance alerts. Alerts are notifications that occur in
response to selected system events. These notifications also occur when one of the following values
goes over a specified threshold on a managed host, VM, or storage repository: CPU usage, network
usage, memory usage, control domain memory usage, storage throughput, or VM disk usage. You
can configure the alerts by using the xe CLI or by using XenCenter. To create notifications based on
any of the available Host or VM performance metrics see Performance alerts.
Customers can monitor the performance of their XenServer hosts and Virtual Machines (VMs) using
the metrics exposed through Round Robin Databases (RRDs). These metrics can be queried over HTTP
or through the RRD2CSV tool. In addition, XenCenter uses this data to produce system performance
graphs. For more information, see Analyze and visualize metrics.
The following tables list all of the available host and VM metrics.
Notes:
• Latency over a period is defined as the average latency of operations during that period.
• The availability and utility of certain metrics are SR and CPU dependent.
cpu<cpu>-P< Time CPU cpu spent in P‑state exists on CPU CPU cpu P‑state
pstate> P‑state pstate in pstate
milliseconds.
cpu<cpu> Utilization of physical CPU cpu exists CPU cpu
CPU cpu (fraction).
Enabled by default.
cpu_avg Mean utilization of None Average CPU
physical CPUs
(fraction). Enabled by
default.
hostload Host load per physical None Host CPU Load
CPU, where load refers
to the number of
vCPU(s) in a running or
runnable state.
inflight_<sr- Number of I/O At least one plugged sr Inflight Requests
uuid-short> requests currently in VBD in SR sr on the
flight. Enabled by host
default.
Data read from SR
io_throughput_read_ At least one plugged sr Read Throughput
<sr-uuidshort> (MiB/s). VBD in SR sr on the
host
Data written to the SR
io_throughput_write_ At least one plugged sr Write Throughput
<sr-uuidshort> (MiB/s). VBD in SR sr on the
host
All SR I/O (MiB/s).
io_throughput_total_ At least one plugged sr Total Throughput
<sr-uuidshort> VBD in SR sr on the
host
iops_read_<sr- Read requests per At least one plugged sr Read IOPS
uuid-short> second. VBD in SR sr on the
host
iops_write_<sr- Write requests per At least one plugged sr Write IOPS
uuid-short> second. VBD in SR sr on the
host
iops_total_<sr- I/O requests per At least one plugged sr Total IOPS
uuid-short> second. VBD in SR sr on the
host
Available VM metrics
vbd <vbd> I/O requests per At least one plugged Disk vbd Total IOPS
_iops_total second. VBD for non‑ISO VDI on
the host
vbd <vbd> Percentage of time At least one plugged Disk vbd IO Wait
_iowait waiting for I/0. VBD for non‑ISO VDI on
the host
vbd <vbd> Number of I/O At least one plugged Disk vbd Inflight
_inflight requests currently in VBD for non‑ISO VDI on Requests
flight. the host
vbd <vbd> Average I/O queue size. At least one plugged Disk vbd Queue Size
_avgqu_sz VBD for non‑ISO VDI on
the host
vif_<vif>_rx Bytes per second VIF vif exists vif Receive
received on virtual
interface number vif.
Enabled by default.
vif_<vif>_tx Bytes per second VIF vif exists vif Send
transmitted on virtual
interface vif.
Enabled by default.
vif_<vif> Receive errors per VIF vif exists vif Receive Errors
_rx_errors second on virtual
interface vif.
Enabled by default.
vif_<vif> Transmit errors per VIF vif exists vif Send Errors
_tx_errors second on virtual
interface vif Enabled
by default.
Note:
The Performance tab in XenCenter provides real time monitoring of performance statistics across re‑
source pools in addition to graphical trending of virtual and physical machine performance. Graphs
showing CPU, memory, network, and disk I/O are included on the Performance tab by default. You
can add more metrics, change the appearance of the existing graphs or create extra ones. For more
information, see Configuring metrics in the following section.
• You can view up to 12 months of performance data and zoom in to take a closer look at activity
spikes.
• XenCenter can generate performance alerts when CPU, memory, network I/O, storage I/O, or
disk I/O usage exceed a specified threshold on a host, VM, or SR. For more information, see
Alerts in the following section.
Note:
1. On the Performance tab, click Actions and then New Graph. The New Graph dialog box is
displayed.
3. From the list of Datasources, select the check boxes for the datasources you want to include in
the graph.
4. Click Save.
1. Navigate to the Performance tab, and select the graph that you would like to modify.
2. Right‑click on the graph and select Actions, or click the Actions button. Then select Edit Graph.
3. On the graph details window, make the necessary changes, and click OK.
Configure the graph type Data on the performance graphs can be displayed as lines or as areas. To
change the graph type:
2. To view performance data as a line graph, click the Line graph option.
3. To view performance data as an area graph, click the Area graph option.
Comprehensive details for configuring and viewing XenCenter performance graphs can be found in
the XenCenter documentation in the section Monitoring System Performance.
Configure metrics
Note:
C‑states and P‑states are power management features of some processors. The range of states
available depends on the physical capabilities of the host, as well power management configu‑
ration.
For example:
1 name_label: cpu0-C1
2 name_description: Proportion of time CPU 0 spent in C-state 1
3 enabled: true
4 standard: true
5 min: 0.000
6 max: 1.000
7 units: Percent
Enable a specific metric Most metrics are enabled and collected by default, to enable those metrics
that are not, enter the following:
Disable a specific metric You might not want to collect certain metrics regularly. To disable a pre‑
viously enabled metric, enter the following:
Display a list of currently enabled host metrics To list the host metrics currently being collected,
enter the following:
1 xe host-data-source-list host=hostname
Display a list of currently enabled VM metrics To host the VM metrics currently being collected,
enter the following:
1 xe vm-data-source-list vm=vm_name
Use RRDs
XenServer uses RRDs to store performance metrics. These RRDs consist of multiple Round Robin
Archives (RRAs) in a fixed size database.
Each archive in the database samples its particular metric on a specified granularity:
The sampling that takes place every five seconds records actual data points, however the follow‑
ing RRAs use Consolidation Functions instead. The consolidation functions supported by XenServer
are:
• AVERAGE
• MIN
• MAX
RRDs exist for individual VMs (including dom0) and the XenServer host. VM RRDs are stored on the
host on which they run, or the pool coordinator when not running. Therefore the location of a VM
must be known to retrieve the associated performance data.
For detailed information on how to use XenServer RRDs, see the XenServer Software Development Kit
Guide.
You can download RRDs over HTTP from the XenServer host specified using the HTTP handler regis‑
tered at /host_rrd or /vm_rrd. Both addresses require authentication either by HTTP authentica‑
tion, or by providing a valid management API session references as a query argument. For example:
Download a Host RRD.
Download a VM RRD.
Both of these calls download XML in a format that can be parsed directly.
In addition to viewing performance metrics in XenCenter, the rrd2csv tool logs RRDs to Comma Sepa‑
rated Value (CSV) format. Man and help pages are provided. To display the rrd2csv tool man or help
pages, run the following command:
1 man rrd2csv
Or
1 rrd2csv --help
Note:
Where multiple options are used, supply them individually. For example: to return both the UUID
and the name‑label associated with a VM or a host, call rrd2csv as shown below:
rrd2csv -u -n
The UUID returned is unique and suitable as a primary key, however the name‑label of an entity
might not necessarily be unique.
The man page (rrd2csv --help) is the definitive help text of the tool.
Alerts
You can configure XenServer to generate alerts based on any of the available Host or VM Metrics. In
addition, XenServer provides preconfigured alerts that trigger when hosts undergo certain conditions
and states. You can view these alerts using XenCenter or the xe CLI.
You can view different types of alerts in XenCenter by clicking Notifications and then Alerts. The
Alerts view displays various types of alerts, including Performance alerts, System alerts, and Software
update alerts.
Performance alerts
Performance alerts can be generated when one of the following values exceeds a specified threshold
on a managed host, VM, or storage repository (SR): CPU usage, network usage, memory usage, control
domain memory usage, storage throughput, or VM disk usage.
By default, the alert repeat interval is set to 60 minutes, it can be modified if necessary. Alerts are
displayed on the Alerts page in the Notifications area in XenCenter. You can also configure XenCenter
to send an email for any specified performance alerts along with other serious system alerts.
Any customized alerts that are configured using the xe CLI are also displayed on the Alerts page in
XenCenter.
Each alert has a corresponding priority/severity level. You can modify these levels and optionally
choose to receive an email when the alert is triggered. The default alert priority/severity is set at 3
.
1. In the Resources pane, select the relevant host, VM, or SR, then click the General tab and then
Properties.
2. Select the Alerts tab. The following table summarizes which alerts are available for hosts, VMs,
or SRs:
To change the alert repeat interval, enter the number of minutes in the Alert repeat interval
box. When an alert threshold has been reached and an alert generated, another alert is not
generated until after the alert repeat interval has elapsed.
For comprehensive details on how to view, filter and configure severities for performance alerts, see
Configuring Performance Alerts in the XenCenter documentation.
System alerts
The following table displays the system events/conditions that trigger an alert to be displayed on the
Alerts page in XenCenter.
• XenCenter old: XenServer expects a newer version but can still connect to the current version
• XenCenter out of date: XenCenter is too old to connect to XenServer
• XenServer out of date: XenServer is an old version that the current XenCenter cannot connect
to
• License expired alert: XenServer license has expired
• Missing IQN alert: XenServer uses iSCSI storage but the host IQN is blank
• Duplicate IQN alert: XenServer uses iSCSI storage, and there are duplicate host IQNs
Note:
Triggers for alerts are checked at a minimum interval of five minutes. This interval avoids placing
excessive load on the system to check for these conditions and reporting of false positives. Set‑
ting an alert repeat interval smaller than five minutes results in the alerts still being generated at
the five minute minimum interval.
The performance monitoring perfmon tool runs once every five minutes and requests updates from
XenServer which are averages over one minute. These defaults can be changed in /etc/sysconfig
/perfmon.
The perfmon tool reads updates every five minutes of performance variables running on the same
host. These variables are separated into one group relating to the host itself, and a group for each
VM running on that host. For each VM and host, perfmon reads the parameter other-config
:perfmon and uses this string to determine which variables to monitor, and under which circum‑
stances to generate a message.
For example, the following shows an example of configuring a VM “CPU usage”alert by writing an XML
string into the parameter other-config:perfmon:
Note:
After setting the new configuration, use the following command to refresh perfmon for each host:
If this refresh is not done, there is a delay before the new configuration takes effect, since by default,
perfmon checks for new configuration every 30 minutes. This default can be changed in /etc/
sysconfig/perfmon.
Valid VM elements
• name: The name of the variable (no default). If the name value is either cpu_usage,
network_usage, or disk_usage, the rrd_regex and alarm_trigger_sense
parameters are not required as defaults for these values are used.
• alarm_trigger_period: The number of seconds that values (above or below the alert
threshold) can be received before an alert is sent (the default is 60).
• consolidation_fn: Combines variables from rrd_updates into one value. For cpu-usage
the default is average, for fs_usage the default isget_percent_fs_usage and for all
others ‑ sum.
– cpu_usage
– memory_internal_free
– network_usage
– disk_usage
– cpu_usage
– network_usage
– memory_free_kib
– sr_io_throughput_total_xxxxxxxx (where xxxxxxxxis the first eight characters of the SR‑
UUID).
SR Throughput: Storage throughput alerts must be configured on the SR rather than the host. For
example:
1 <config>
2 <variable>
3 <name value="NAME_CHOSEN_BY_USER"/>
4 <alarm_trigger_level value="THRESHOLD_LEVEL_FOR_ALERT"/>
5 <alarm_trigger_period value="
RAISE_ALERT_AFTER_THIS_MANY_SECONDS_OF_BAD_VALUES"/>
6 <alarm_priority value="PRIORITY_LEVEL"/>
7 <alarm_trigger_sense value="HIGH_OR_LOW"/>
8 <alarm_auto_inhibit_period value="
MINIMUM_TIME_BETWEEN_ALERT_FROM_THIS_MONITOR"/>
9 <consolidation_fn value="FUNCTION_FOR_COMBINING_VALUES"/>
10 <rrd_regex value="REGULAR_EXPRESSION_TO_CHOOSE_DATASOURCE_METRIC"/>
11 </variable>
12
13 <variable>
14 ...
15 </variable>
16
17 ...
18 </config>
You can configure XenServer to send email notifications when XenServer hosts generate alerts. The
mail‑alarm utility in XenServer uses sSMTP to send these email notifications. You can enable basic
email alerts by using XenCenter or the xe Command Line Interface (CLI). For further configuration of
email alerts, you can modify the mail-alarm.conf configuration file.
Use an SMTP server that does not require authentication. Emails sent through SMTP servers that
require authentication cannot be delivered.
3. Select the Send email alert notifications check box. Enter your preferred destina‑
tion address for the notification emails and SMTP server details.
4. Choose your preferred language from the Mail language list. The default language for per‑
formance alert emails is English.
To configure email alerts, specify your preferred destination address for the notification emails and
SMTP server:
When you turn on email notifications, you receive an email notification when an alert with a priority
of 3 or higher is generated. Therefore, the default minimum priority level is 3. You can change this
default with the following command:
Note:
Some SMTP servers only forward mails with addresses that use FQDNs. If you find that emails
are not being forwarded it might be for this reason. In which case, you can set the server host
name to the FQDN so this address is used when connecting to your mail server.
Further configuration
1 root=postmaster
2 authUser=<username>
3 authPass=<password>
4 mailhub=@MAILHUB@
1 mailhub=@MAILHUB@
Each SMTP server can differ slightly in its setup and may require extra configuration. To further config‑
ure sSMTP, modify its configuration file ssmtp.conf. By storing relevant keys in the mail-alarm.
conf file, you can use the values in pool.other_config to configure sSMTP. The following extract
from the ssmtp.conf man page shows the correct syntax and available options:
1 NAME
2 ssmtp.conf – ssmtp configuration file
3
4 DESCRIPTION
5 ssmtp reads configuration data from /etc/ssmtp/ssmtp.conf The file
con-
6 tains keyword-argument pairs, one per line. Lines starting with '#'
7 and empty lines are interpreted as comments.
8
9 The possible keywords and their meanings are as follows (both are case-
10 insensitive):
11
12 Root
13 The user that gets all mail for userids less than 1000. If blank,
14 address rewriting is disabled.
15
16 Mailhub
17 The host to send mail to, in the form host | IP_addr port :
18 <port>. The default port is 25.
19
20 RewriteDomain
21 The domain from which mail seems to come. For user authentication.
22
23 Hostname
24 The full qualified name of the host. If not specified, the host
25 is queried for its hostname.
26
27 FromLineOverride
28 Specifies whether the From header of an email, if any, may over
-
29 ride the default domain. The default is "no".
30
31 UseTLS
32 Specifies whether ssmtp uses TLS to talk to the SMTP server.
33 The default is "no".
34
35 UseSTARTTLS
36 Specifies whether ssmtp does a EHLO/STARTTLS before starting
TLS
37 negotiation. See RFC 2487.
38
39 TLSCert
40 The file name of an RSA certificate to use for TLS, if required
.
41
42 AuthUser
43 The user name to use for SMTP AUTH. The default is blank, in
XenCenter supports the creation of tags and custom fields, which allows for organization and quick
searching of VMs, storage and so on. For more information, see Monitoring System Performance.
Custom searches
XenCenter supports the creation of customized searches. Searches can be exported and imported,
and the results of a search can be displayed in the navigation pane. For more information, see Moni‑
toring System Performance.
For FC, SAS and iSCSI HBAs you can determine the network throughput of your PBDs using the follow‑
ing procedure.
For iSCSI and NFS storage, check your network statistics to determine if there is a throughput bottle‑
neck at the array, or whether the PBD is saturated.
The NRPE feature is available for XenServer Premium or Trial Edition customers. For more infor‑
mation about XenServer licensing, see Licensing. To upgrade, or to get a XenServer license, visit
the XenServer website.
Users with the Pool Admin role can use any third‑party monitoring tool that supports the Nagios Re‑
mote Plugin Executor (NRPE) to monitor resources consumed by your XenServer host and dom0 ‑ the
control domain of your host.
You can use the following check plugins to monitor host and dom0 resources:
Default Default
NRPE check warning critical Performance
Metric name Description threshold threshold data returned
Default Default
NRPE check warning critical Performance
Metric name Description threshold threshold data returned
Default Default
NRPE check warning critical Performance
Metric name Description threshold threshold data returned
Default Default
NRPE check warning critical Performance
Metric name Description threshold threshold data returned
Default Default
NRPE check warning critical Performance
Metric name Description threshold threshold data returned
NRPE is an on‑premises service that runs in dom0 and listens on TCP port (default) 5666 for check
execution requests from a monitoring tool. After a request arrives, NRPE parses it, finds the corre‑
sponding check command including the parameter’s details from the configuration file, and then runs
it. The result of the check is sent to the monitoring tool, which stores the results of past checks and
provides a graph showing the historical performance data.
Prerequisites
To be able to use NRPE to monitor host and dom0 resources, the monitoring tool you are using must
meet the following prerequisites:
Constraints
• You can configure NRPE settings for an entire pool or for a standalone host that is not part of a
pool. Currently, you cannot configure NRPE settings for an individual host in a pool.
• If you add a host to a pool that already has NRPE enabled and configured on it, XenCenter does
not automatically apply the pool’s NRPE settings to the new host. You must reconfigure NRPE
settings on the pool after adding the new host or configure the new host with same NRPE set‑
tings before adding it to the pool.
Note:
When reconfiguring NRPE settings on a pool after adding a new host, ensure the host is up
and running.
• If a host is removed from a pool with NRPE enabled and configured on it, XenCenter does not
alter the NPRE settings on the host or the pool.
You can configure NRPE by using the xe CLI or XenCenter. For more information on how to configure
NRPE by using XenCenter, see Monitoring host and dom0 resources with NRPE.
After making configuration changes to NRPE, restart the NRPE service by using:
Enable NRPE NRPE is disabled by default in XenServer. To enable NRPE on a host’s control domain
(dom0), run the following commands in the xe CLI:
1. Get the host UUID of the host that you want to monitor:
xe host-list
If the operation runs successfully, this command outputs Success. When XenServer restarts,
NRPE starts automatically.
Monitoring servers This is a comma‑delimited list of IP addresses or host names that are allowed
to talk to the NRPE daemon. Network addresses with a bit mask (for example 192.168.1.0/24)
are also supported.
Logs
1 ssl_logging=0x00
Warning and critical thresholds For some of these check plugins, you can set warning and critical
threshold values so that if the value returned by a check plugin exceeds the threshold values, an alert
is generated. The warning threshold indicates a potential issue and the critical threshold indicates a
more serious issue that requires immediate attention. Although default values are set for the warning
and critical thresholds, you can adjust the threshold values.
To query the default warning and critical threshold values for all the checks, run the following xe CLI
command which returns a list of all the checks and their associated warning and critical thresholds:
You can also query the threshold values for a specific check. For example, to get the warning and
critical threshold values for the check_memory check plugin, run the following xe CLI command:
You can also change the default value of a threshold. For example, to change the default threshold
values for the check_memory check plugin, run the following xe CLI command:
The SNMP feature is available for XenServer Premium or Trial Edition customers. For more infor‑
mation about XenServer licensing, see Licensing. To upgrade, or to get a XenServer license, visit
the XenServer website.
With the Pool Admin role, you can use SNMP to remotely monitor resources consumed by your
XenServer host and dom0 ‑ the control domain of your host. An SNMP manager, also known as a
network management system (NMS), sends query requests to an SNMP agent running on a XenServer
host. The SNMP agent replies to these query requests by sending data collected on various metrics
back to the NMS. The data that can be collected is defined by object identifiers (OIDs) in a text file
called a management information base (MIB). An OID represents a specific piece of measurable
information about a network device, such as CPU or memory usage.
You can also configure traps, which are agent‑initiated messages that alert the NMS that a specific
event has occurred in XenServer. Both query requests and traps can be used to monitor the status
of your XenServer pools. These are defined as metric and trap objects and are identified by OIDs in
a MIB file XENSERVER-MIB.txt, available to download from the XenServer Downloads page. The
following tables provide information about these metric and trap objects.
Metric objects
You can request a specific piece of information about your XenServer hosts by using the metrics listed
in the following table. These metrics are used by the SNMP manager when sending query requests to
an SNMP agent and so you can view this data in your NMS.
You can view the returned data from these metric objects from your NMS or from the xe CLI. To
query the metric objects from the xe CLI, run host-data-source-query or vm-data-source
-query and provide the RRDD data source as a value for the data-source parameter. For
example:
Note:
By default, the NMS sends OID query requests to SNMP agents using port 161.
Notes:
1. The name of a pCPU is in the format cpu followed by a number. To query the number of
pCPUs from the xe CLI, run the following command:
This returns a list of the CPU metrics that match the regular expression cpu[0-9]+.
Traps
Traps are alerts sent by the SNMP agent to notify the SNMP manager when certain events occur, al‑
lowing you to monitor your XenServer hosts and identify issues early. You can configure your SNMP
settings to generate a trap when a limit is reached (for example, if the host CPU usage is too high).
When a trap is generated, it is sent to your NMS and the following fields are returned as part of the
trap object.
Note:
By default, the SNMP agent on the pool coordinator host sends traps to the NMS using UPD port
162.
Prerequisites
• All hosts in a pool must be running the same XenServer version and this version must contain
the SNMP plugin.
Note:
If you cannot see the SNMP tab in XenCenter, it might be because the host or a member
of the pool is not running a version of XenServer that supports SNMP. Update the host or
pool to the latest version of XenServer.
Constraints
• You can configure SNMP settings for an entire pool or for a standalone host that is not part of a
pool. Currently, you cannot configure SNMP settings for an individual host in a pool.
• If you add a host to a pool that already has SNMP enabled and configured on it, XenCenter does
not automatically apply the pool’s SNMP settings to the new host. You must reconfigure SNMP
settings on the pool after adding the new host or configure the new host with the same SNMP
settings before adding it to the pool.
Note:
When reconfiguring SNMP settings on a pool after adding a new host, ensure the host is up
and running and not in maintenance mode.
• Before performing a rolling pool upgrade from Citrix Hypervisor 8.2 CU1 to XenServer 8 or ap‑
plying updates to your XenServer hosts and pools, back up the following configuration files if
you manually modified them before and need them:
– /etc/snmp/snmpd.xs.conf
– /etc/sysconfig/snmp
– /var/lib/net-snmp/snmpd.conf
• When the SNMP agent is offline, traps cannot be generated. For example, if the SNMP agent is
restarted or the pool coordinator is rebooted or re‑designated.
You can configure SNMP by using the xe CLI or XenCenter. For more information on how to configure
SNMP by using XenCenter, see Monitoring host and dom0 resources with SNMP.
result objects When configuring SNMP, all responses are returned in JSON format. If a command
executes successfully, it returns the key value pair "code": 0. Some commands (such as the get
-config command) return a nested JSON object called result. The result JSON object is also
required for the set-config command which is used to update the SNMP configuration.
The result JSON object is made up of the following objects common, agent, and nmss:
common
agent
nmss
Notes:
Configure the SNMP service Get the status of the SNMP service:
If successful, this command returns the key value pair "code": 0 and the result JSON object
containing the configuration details of the SNMP service. For example:
1 "code": 0,
2 "result": {
3
4 "common": {
5
6 "enabled": "no",
7 "debug_log": "no",
8 "max_nmss": 1
9 }
10 ,
11 "agent": {
12
13 "v2c": "yes",
14 "v3": "no",
15 "community": "public",
16 "user_name": "",
17 "authentication_password": "",
18 "authentication_protocol": "",
19 "privacy_password": "",
20 "privacy_protocol": "",
21 "engine_id": "<engine_id>"
22 }
23 ,
24 "nmss": []
25 }
Copy the result JSON object to your preferred text editor and remove all newline (\n) characters
from the file. Update the fields with your SNMP configuration details. Configure your NMS by referring
to your NMS documentation and specifying values for the fields required for the nmss object. For
more information, refer to the objects listed above.
To configure the SNMP service, run the set-config command and provide the edited result
JSON object as a parameter value to the args:config parameter.
where result is the result JSON object returned from the get-config command that you copied
and edited.
Note:
To configure SNMP for an entire pool, you must run the set-config command for each host
in the pool.
If the configuration changes are successful, the command returns the key value pair "code": 0. If
the configuration changes are unsuccessful, the set-config command returns one of the following
key value pairs which indicate that an error has occurred:
You can also send a test SNMP trap to your NMS to verify that the specified trap receiver information
is correct.
This command sends a test trap to your NMS with the msg_name of TEST_TRAP and the msg_body
of This is a test trap from XenServer pool "<pool name>"to verify the
NMS Trap Receiver configuration.
If you do not receive the test trap, check your SNMP configuration again. If unsuccessful, the send-
test-trap command also returns one of the following key value pairs which indicate that an error
has occurred:
November 9, 2023
The optimum number of vCPUs per pCPU on a host depends on your use case. During operation, en‑
sure that you monitor the performance of your XenServer environment and adjust your configuration
accordingly.
Terms
In this area, there are various terms that are sometimes used interchangeably. In this article, we use
the following terms and meanings:
General behavior
The total number of vCPUs on a host is the number of vCPUs used by dom0 added to the total number
of vCPUs assigned to all the VMs on the host. As you increase the number of vCPUs on a host, you can
experience the following types of behavior:
• When the total number of vCPUs on the host is less than or equal to the number of pCPUs on the
host, the host always provides as much CPU as is requested by the VMs.
• When the total number of vCPUs on the host is greater than the number of pCPUs on the host,
the host shares the time of the host pCPUs to the VMs. This behavior does not generally affect
the VMs because their vCPUs are usually idle for some of the time and, in most cases the host
does not reach 100% pCPU usage.
• When the total number of vCPUs on the host is greater than the number of pCPUs on the host
and the host is sometimes reaching 100% host pCPU usage, the vCPUs of the VMs don’t receive
as much pCPU as they request during the spikes. Instead, during these spikes the VMs slow
down to receive a share of the available pCPU on the host.
• When the total number of vCPUs on the host is greater than the number of pCPUs on the host
and the host is often reaching 100% host pCPU usage, the vCPUs of the VMs are continuously
slowed down to receive a share of the available CPUs on the host. If the VMs have real‑time
requirements, this situation is not ideal and you can address it by reducing the number of vCPUs
on the host.
The optimum number of vCPUs on a host can depend on the VM users’perception of the speed of their
VMs, especially when the VMs have real‑time requirements.
To find the total number of pCPUs on your host, run the following command:
1 xe host-cpu-info --minimal
To find the total number of vCPUs (guest and dom0) currently on your host, run the following com‑
mand:
XenServer provides RRD metrics that describe how the vCPUs on your VMs are performing.
When a host is reaching 100% of host pCPU usage, use these VM metrics to decide whether to move
the VM to another host:
runstate_concurrency_hazard
Suggested actions:
runstate_partial_contention
• runstate_partial_contention > 0% indicates both that at least one vCPU wants to run but can’
t get pCPU time, and also that at least one other vCPU is blocked (either because there’s nothing
to do or it’s waiting for I/O to complete).
Suggested action:
Check whether the back end I/O storage servers are overloaded by looking at the back‑
end metrics provided by your storage vendor. If the storage servers are not overloaded
and there are performance issues, take one of the following actions:
runstate_full_contention
• runstate_full_contention > 0% indicates that sometimes the vCPUs want to run all at the same
time but none can get pCPU time.
Suggested actions:
If a host is not reaching 100% of host pCPU usage, use these VM metrics to decide whether a VM has
the right number of vCPUs:
runstate_fullrun
• runstate_fullrun = 0% indicates that the vCPUs are never being used all at the same time.
Suggested action:
• 0% < runstate_fullrun < 100% indicates that the vCPUs are sometimes being used all at the
same time.
• runstate_fullrun = 100% indicates that the vCPUs are always being used all at the same time.
Suggested action:
You can increase the number of vCPUs in this VM, until runstate_fullrun < 100%. Do not
increase the number of vCPUs further, otherwise it can increase the probability of concur‑
rency hazard if the host reaches 100% of pCPU usage.
runstate_partial_run
• runstate_partial_run = 0% indicates that either all vCPUs are always being used (full‑
run=100%) or no vCPUs are being used (idle=100%).
• 0% < runstate_partial_run < 100% indicates that, sometimes, at least one vCPU is blocked,
either because they have nothing to do, or because they are waiting for I/O to complete.
• runstate_partial_run=100% indicates that there is always at least one vCPU that is blocked.
Suggested action:
Check whether the back‑end I/O storage servers are overloaded. If they are not, the VM
probably has too many vCPUs and you can decrease the number of vCPUs in this VM. Hav‑
ing too many vCPUs in a VM can increase the risk of the VM going into the concurrency
hazard state when the host CPU usage reaches 100%.
May 7, 2024
This section provides an overview of how to create Virtual Machines (VMs) using templates. It also
explains other preparation methods, including cloning templates and importing previously exported
VMs.
A Virtual Machine (VM) is a software computer that, like a physical computer, runs an operating sys‑
tem and applications. The VM comprises a set of specification and configuration files backed by the
physical resources of a host. Every VM has virtual devices that provide the same functions as physical
hardware. VMs can give the benefits of being more portable, more manageable, and more secure. In
addition, you can tailor the boot behavior of each VM to your specific requirements. For more infor‑
mation, see VM Boot Behavior.
XenServer supports guests with any combination of IPv4 or IPv6 configured addresses.
In XenServer VMs can operate in full virtualized mode. Specific processor features are used to ‘trap’
privileged instructions that the virtual machine carries out. This capability enables you to use an un‑
modified operating system. For network and storage access, emulated devices are presented to the
virtual machine. Alternatively, PV drivers can be used for performance and reliability reasons.
Create VMs
Use VM templates
VMs are prepared from templates. A template is a gold image that contains all the various configu‑
ration settings to create an instance of a specific VM. XenServer ships with a base set of templates,
which are raw VMs, on which you can install an operating system. Different operating systems require
different settings to run at their best. XenServer templates are tuned to maximize operating system
performance.
There are two basic methods by which you can create VMs from templates:
• Installing an operating system from a CD, ISO image or network repository onto the appropriate
provided template.
Windows VMs describes how to install Windows operating systems onto VMs.
Linux VMs describes how to install Linux operating systems onto VMs.
Note:
Templates created by older versions of XenServer can be used in newer versions of XenServer.
However, templates created in newer versions of XenServer are not compatible with older ver‑
sions of XenServer. If you created a VM template by using Citrix Hypervisor 8.2, to use it with an
earlier version, export the VDIs separately and create the VM again.
In addition to creating VMs from the provided templates, you can use the following methods to create
VMs.
Clone an existing VM You can make a copy of an existing VM by cloning from a template. Templates
are ordinary VMs which are intended to be used as original copies to create instances of VMs from. A VM
can be customized and converted into a template. Ensure that you follow the appropriate preparation
procedure for the VM. For more information, see Preparing for Cloning a Windows VM Using Sysprep
and Preparing to Clone a Linux VM.
Note:
• A full copy
• Copy‑on‑Write
The faster Copy‑on‑Write mode only writes modified blocks to disk. Copy‑on‑Write is designed
to save disk space and allow fast clones, but slightly slows down normal disk performance. A
template can be fast‑cloned multiple times without slowdown.
Note:
If you clone a template into a VM and then convert the clone into a template, disk perfor‑
mance can decrease. The amount of decrease has a linear relationship to the number of
times this process has happened. In this event, the vm-copy CLI command can be used
to perform a full copy of the disks and restore expected levels of disk performance.
Notes for resource pools If you create a template from VM virtual disks on a shared SR, the template
cloning operation is forwarded to any host in the pool that can access the shared SRs. However, if you
create the template from a VM virtual disk that only has a local SR, the template clone operation is
only able to run on the host that can access that SR.
Import an exported VM You can create a VM by importing an existing exported VM. Like cloning,
exporting and importing a VM is fast way to create more VMs of a certain configuration. Using this
method enables you to increase the speed of your deployment. You might, for example, have a special‑
purpose host configuration that you use many times. After you set up a VM as required, export it and
import it later to create another copy of your specially configured VM. You can also use export and
import to move a VM to the XenServer host that is in another resource pool.
For details and procedures on importing and exporting VMs, see Importing and Exporting VMs.
XenServer VM Tools
XenServer VM Tools provide high performance I/O services without the overhead of traditional device
emulation.
XenServer VM Tools for Windows consist of I/O drivers (also known as paravirtualized drivers or PV
drivers) and the Management Agent.
The I/O drivers contain storage and network drivers, and low‑level management interfaces. These
drivers replace the emulated devices and provide high‑speed transport between Windows and the
XenServer product family software. While installing a Windows operating system, XenServer uses tra‑
ditional device emulation to present a standard IDE controller and a standard network card to the VM.
This emulation allows the Windows installation to use built‑in drivers, but with reduced performance
due to the overhead inherent in emulating the controller drivers.
The Management Agent, also known as the Guest Agent, is responsible for high‑level virtual machine
management features and provides a full set of functions to XenCenter.
Install XenServer VM Tools for Windows on each Windows VM for that VM to have a fully supported
configuration, and to be able to use the xe CLI or XenCenter. A VM functions without the XenServer VM
Tools for Windows, but performance is hampered when the I/O drivers (PV drivers) are not installed.
You must install XenServer VM Tools for Windows on Windows VMs to be able to perform the following
operations:
XenServer VM Tools for Linux contain a guest agent that provides extra information about the VM to
the host.
You must install the XenServer VM Tools for Linux on Linux VMs to be able to perform the following
operations:
Note:
You cannot use the Dynamic Memory Control (DMC) feature on Red Hat Enterprise Linux 8,
Red Hat Enterprise Linux 9, Rocky Linux 8, Rocky Linux 9, or CentOS Stream 9 VMs as these
operating systems do not support memory ballooning with the Xen hypervisor.
XenCenter reports the virtualization state of a VM on the VM’s General tab. You can find out whether
or not XenServer VM Tools are installed. This tab also displays whether the VM can install and receive
updates from Windows Update. The following section lists the messages displayed in XenCenter:
I/O optimized (not optimized): This field displays whether or not the I/O drivers are installed on the
VM.
Management Agent installed (not installed): This field displays whether or not the Management
Agent is installed on the VM.
Able to (Not able to) receive updates from Windows Update: specifies whether the VM can receive
I/O drivers from Windows Update.
Note:
Windows Server Core 2016 does not support using Windows Update to install or update the I/O
drivers. Instead use the XenServer VM Tools for Windows installer provided on the XenServer
Downloads page.
Install I/O drivers and Management Agent: this message is displayed when the VM does not have
the I/O drivers or the Management Agent installed.
XenServer enables the following guest operating systems to boot in UEFI mode:
• Windows 10
• Windows 11
• Windows Server 2016
• Windows Server 2019
• Windows Server 2022
• Red Hat Enterprise Linux 8
• Red Hat Enterprise Linux 9 (preview)
• Ubuntu 20.04
• Ubuntu 22.04
• Rocky Linux 8
• Rocky Linux 9 (preview)
• SUSE Linux Enterprise 15
• Debian Bookworm 12 (preview)
• Oracle Linux 8
UEFI boot provides a richer interface for the guest operating systems to interact with the hardware,
which can significantly reduce VM boot times. If XenServer supports UEFI boot for your guest operat‑
ing system, we recommend that you choose this boot mode instead of BIOS.
For these operating systems, XenServer also supports Secure Boot. Secure Boot prevents unsigned,
incorrectly signed or modified binaries from being run during boot. On a UEFI‑enabled VM that en‑
forces Secure Boot, all drivers must be signed. This requirement might limit the range of uses for the
VM, but provides the security of blocking unsigned/modified drivers. If you use an unsigned driver,
secure boot fails and an alert is shown in XenCenter. Secure Boot also reduces the risk that malware
in the guest can manipulate the boot files or run during the boot process.
You must specify the boot mode when creating a VM. It is not possible to change the boot mode of a
VM between BIOS and UEFI (or UEFI Secure Boot) after booting the VM for the first time. However, you
can change the boot mode between UEFI and UEFI Secure Boot after the VM is used to troubleshoot
potential Secure Boot issues. For more information, see Troubleshooting.
• Ensure that a UEFI‑enabled Windows VM has at least two vCPUs. UEFI‑enabled Linux VMs do
not have this restriction.
• You can import or export a UEFI‑enabled VM created on XenServer as an OVA, OVF, or an XVA
file. Importing a UEFI‑enabled VM from OVA or OVF packages created on other hypervisors is
not supported.
• To use PVS‑Accelerator with UEFI‑enabled VMs, ensure that you are using Citrix Provisioning
1906 or later.
• For Windows VMs, use the UEFI settings menu to change the screen resolution of the XenCenter
console. For detailed instructions, see Troubleshooting.
Note
UEFI‑enabled VMs use NVME and E1000 for emulated devices. The emulation information does
not display these values until after you install XenServer VM Tools for Windows on the VM.
UEFI‑enabled VMs also show as only having 2 NICs until after you install XenServer VM Tools for
Windows.
You can use XenCenter or the xe CLI to enable UEFI boot or UEFI Secure Boot for your VM.
For information about creating a UEFI‑enabled VM in XenCenter, see Create a Windows VM by using
XenCenter or Create a Linux VM by using XenCenter.
Using the xe CLI to enable UEFI boot or UEFI Secure Boot When you create a VM, run the following
command before booting the VM for the first time:
Where, UUID is the VM’s UUID, MODE is either BIOS or uefi, and OPTION is either ‘true’or ‘false’.
If you do not specify the mode, it defaults to uefi if that option is supported for your VM operating
system. Otherwise, the mode defaults to BIOS. If you do not specify the secureboot option, it
defaults to ‘auto’. For UEFI‑enabled VMs, the ‘auto’behavior is to enable Secure Boot for the VM.
To create a UEFI‑enabled VM from a template supplied with XenServer, run the following command:
Do not run this command for templates that have something installed on them or templates that you
created from a snapshot. The boot mode of these snapshots cannot be changed and, if you attempt
to change the boot mode, the VM fails to boot.
When you boot the UEFI‑enabled VM the first time you are prompted on the VM console to press any
key to start the installation. If you do not start the operating system installation, the VM console
switches to the UEFI shell.
To restart the installation process, in the UEFI console, type the following commands.
1 EFI:
2 EFI\BOOT\BOOTX64
When the installation process restarts, watch the VM console for the installation prompt. When the
prompt appears, press any key.
You might want to disable Secure Boot on occasion. For example, some types of debugging cannot be
enabled on a VM that in Secure Boot user mode. To disable Secure Boot, change the VM into Secure
Boot setup mode. On your XenServer host, run the following command:
Keys
UEFI‑enabled Windows VMs are provisioned with a PK from an ephemeral private key, the Microsoft
KEK, the Microsoft Windows Production PCA, and Microsoft third party keys. The VMs are also provided
with an up‑to‑date revocation list from the UEFI forum. This configuration enables Windows VMs to
boot with Secure Boot turned on and to receive automatic updates to the keys and revocation list
from Microsoft.
To install third‑party drivers in a Linux VM that has Secure Boot enabled, you must create a signing
key, add it to the VM as a machine owner key (MOK), and use that key to sign the driver. For more
information, see Install third‑party drivers on your Secure Boot Linux VM.
For information about troubleshooting your UEFI or UEFI Secure Boot VMs, see Troubleshoot UEFI and
Secure Boot problems.
For a list of supported guest operating systems, see Supported Guests, Virtual Memory, and Disk Size
Limits
This section describes the differences in virtual device support for the members of the XenServer prod‑
uct family.
The current version of the XenServer product family has some general limitations on virtual devices
for VMs. Specific guest operating systems may have lower limits for certain features. The individual
guest installation section notes the limitations. For detailed information on configuration limits, see
Configuration Limits.
Factors such as hardware and environment can affect the limitations. For information about sup‑
ported hardware, see the XenServer Hardware Compatibility List.
VM block devices XenServer emulates an IDE bus in the form of an hd* device. When using Win‑
dows, installing the XenServer VM Tools installs a special I/O driver that works in a similar way to Linux,
except in a fully virtualized environment.
CPU features
A pool’s CPU feature set can change while a VM is running, for example, when a new host is added to
an existing pool or when the VM is migrated to a host in another pool. When a pool’s CPU feature set
changes, the VM continues to use the feature set which was applied when it was started. To update
the VM to use the pool’s new feature set, you must restart the VM.
Windows VMs
July 9, 2024
Installing Windows VMs on the XenServer host requires hardware virtualization support (Intel VT or
AMD‑V).
Note:
Warning:
Windows VMs are supported only when the VMs have the XenServer VM Tools for Windows in‑
stalled.
Windows VM templates
Windows operating systems are installed onto VMs by cloning an appropriate template using either
XenCenter or the xe CLI, and then installing the operating system. The templates for individual guests
have predefined platform flags set which define the configuration of the virtual hardware. For exam‑
ple, all Windows VMs are installed with the ACPI Hardware Abstraction Layer (HAL) mode enabled. If
you later change one of these VMs to have multiple virtual CPUs, Windows automatically switches the
HAL to multi‑processor mode.
Windows 10 (64‑bit) BIOS, UEFI, UEFI Secure Boot Used to install Windows 10
(64‑bit)
Windows 11 (64‑bit) UEFI, UEFI Secure Boot Used to install Windows 11
(64‑bit)
Windows Server 2016 (64‑bit) BIOS, UEFI, UEFI Secure Boot Used to install Windows Server
2016 or Windows Server Core
2016 (64‑bit)
Windows Server 2019 (64‑bit) BIOS, UEFI, UEFI Secure Boot Used to install Windows Server
2019 or Windows Server Core
2019 (64‑bit)
Windows Server 2022 (64‑bit) BIOS, UEFI, UEFI Secure Boot Used to install Windows Server
2022 or Windows Server Core
2022 (64‑bit)
XenServer supports all SKUs (editions) for the listed versions of Windows.
The Windows operating system can be installed either from an install CD in a physical CD‑ROM drive
on the XenServer host, or from an ISO image. See Create ISO images for information on how to make
an ISO image from a Windows install CD and make it available for use.
1. On the XenCenter toolbar, click the New VM button to open the New VM wizard.
The New VM wizard allows you to configure the new VM, adjusting various parameters for CPU,
storage, and networking resources.
Each template contains the setup information that is required to create a VM with a specific
guest operating system (OS), and with optimum storage. This list reflects the templates that
XenServer currently supports.
Note:
If the OS that you are installing on your VM is compatible only with the original hardware,
check the Copy host BIOS strings to VM box. For example, you might use this option for
an OS installation CD that was packaged with a specific computer.
After you first start a VM, you cannot change its BIOS strings. Ensure that the BIOS strings
are correct before starting the VM for the first time.
To copy BIOS strings using the CLI, see Install VMs from Reseller Option Kit (BIOS‑locked) Media.
Advanced users can set user‑defined BIOS strings. For more information, see User‑defined BIOS
strings.
XenServer also allows you to pull OS installation media from a range of sources, including a pre‑
existing ISO library. An ISO image is a file that contains all the information that an optical disc
(CD, DVD, and so on) would contain. In this case, an ISO image would contain the same OS data
as a Windows installation CD.
To attach a pre‑existing ISO library, click New ISO library and indicate the location and type of
the ISO library. You can then choose the specific operating system ISO media from the list.
5. In the Installation Media tab, you can choose a boot mode for the VM. By default, XenCenter
selects the most secure boot mode available for the VM operating system version.
Notes:
• The UEFI Boot and UEFI Secure Boot options appear grayed out if the VM template
you have chosen does not support UEFI boot.
• You cannot change the boot mode after you boot the VM for the first time.
For more information, see Guest UEFI boot and Secure Boot.
• For VM operating systems that require a vTPM, the option is selected and cannot be unse‑
lected.
• For VM operating systems that do not support a vTPM, the option is grayed out and cannot
be selected.
• For VM operating systems that support vTPM, but do not require it, choose whether to
attach a vTPM to the VM.
A home server is the host which provides the resources for a VM in a pool. When you nominate
a home server for a VM, XenServer attempts to start the VM on that host. If this action is not
possible, an alternate host within the same pool is selected automatically. To choose a home
server, click Place the VM on this server and select a host from the list.
Notes:
• In WLB‑enabled pools, the nominated home server isn’t used for starting, restarting,
resuming, or migrating the VM. Instead, Workload Balancing nominates the best host
for the VM by analyzing XenServer resource pool metrics and by recommending opti‑
mizations.
• If a VM has one or more virtual GPUs assigned to it, the home server nomination doesn’
t take effect. Instead, the host nomination is based on the virtual GPU placement pol‑
icy set by the user.
• During rolling pool upgrade, the home server is not considered when migrating the
VM. Instead, the VM is migrated back to the host it was on before the upgrade.
If you do not want to nominate a home server, click Don’t assign this VM a home server. The
VM is started on any host with the necessary resources.
8. Allocate processor and memory resources for the VM. For a Windows 10 VM (64‑bit), the defaults
are 2 virtual CPUs and 4 GB of RAM. You can also choose to modify the defaults. Click Next to
continue.
9. Assign a virtual GPU. The New VM wizard prompts you to assign a dedicated GPU or one or more
virtual GPUs to the VM. This option enables the VM to use the processing power of the GPU. With
this feature, you have better support for high‑end 3D professional graphics applications such as
CAD/CAM, GIS, and Medical Imaging applications.
Click Next to select the default allocation (32 GB) and configuration, or you might want to do
the following extra configuration:
• Change the name, description, or size of your virtual disk by clicking Edit.
• Add a new virtual disk by selecting Add.
• Change the physical network, MAC address, or Quality of Service (QoS) priority of the vir‑
tual disk by clicking Edit.
• Add a new virtual NIC by selecting Add.
12. (Optional) If this VM is to be used as a template with Citrix Provisioning or with the reset-on-
boot flag set, ensure Start the new VM automatically is not selected. This enables you to do
some required configuration before installing Windows.
13. Review settings, and then click Create Now to create the VM and return to the Search tab.
An icon for your new VM appears under the host in the Resources pane.
14. (Optional) If this VM is intended to be used as a template with Citrix Provisioning or has the
reset-on-boot flag set, configure the VM before installing Windows.
In the host console, type the following command:
The flag has-vendor-device=false ensures that Windows Update does not attempt to
install or update the I/O drivers included in the XenServer VM Tools. For more information, see
Settings for Citrix Provisioning targets or reset‑on‑boot machines.
15. On the Resources pane, select the VM, and then click the Console tab to see the VM console.
16. (Optional) If you want to be able to clone the VM, we recommend that you do not run the Win‑
dows first‑time setup, known as the Out‑Of‑Box‑Experience (OOBE). Instead, when the OOBE
starts on the page that asks for region information, press Ctrl + Shift + F3 to enter audit mode.
You can then use Sysprep to generalize the VM. For more information see Prepare to clone a
Windows VM by using Sysprep.
If you do not intend to clone the VM, continue to the following steps in this procedure.
17. Follow the OS installation screen and make your selections.
18. After the OS installation completes and the VM reboots, Install XenServer VM Tools for Windows.
Note:
For Windows 10 and Windows 11 VMs, the requirement for a vTPM is specified by the template.
You are not required to add anything to the xe CLI commands to set up the vTPM.
The value of mode can be either BIOS or uefi and defaults to uefi if that option is supported
for your VM operating system. Otherwise, the mode defaults to BIOS. The value of option
can be set to either true or false. If you do not specify the Secure Boot option, it defaults to
auto.
For more information, see Guest UEFI boot and Secure Boot.
3. (Optional) If this VM is intended to be used as a template with Citrix Provisioning or has the
reset-on-boot flag set, configure the VM before installing Windows.
The flag has-vendor-device=false ensures that Windows Update does not attempt to
install or update the I/O drivers included in the XenServer VM Tools. For more information, see
Settings for Citrix Provisioning targets or reset‑on‑boot machines.
1 xe-mount-iso-sr <path_to_iso_sr>
1 xe cd-list
6. Insert the specified ISO into the virtual CD drive of the specified VM:
1 xe vm-start vm=<vm_name>
8. On the XenCenter Resources pane, select the VM, and then click the Console tab to see the VM
console.
9. (Optional) If you want to be able to clone the VM, we recommend that you do not run the Win‑
dows first‑time setup, known as the Out‑Of‑Box‑Experience (OOBE). Instead, when the OOBE
starts on the page that asks for region information, press Ctrl + Shift + F3 to enter audit mode.
You can then use Sysprep to generalize the VM. For more information see Prepare to clone a
Windows VM by using Sysprep.
If you do not intend to clone the VM, continue to the following steps in this procedure.
11. After the OS installation completes and the VM reboots, install the XenServer VM Tools for Win‑
dows.
For more information on using the CLI, see Command line interface.
XenServer VM Tools for Windows provide high performance I/O services without the overhead of tra‑
ditional device emulation. For more information about the XenServer VM Tools for Windows and ad‑
vanced usage, see XenServer VM Tools for Windows.
Note:
To install XenServer VM Tools for Windows on a Windows VM, the VM must be running the Mi‑
crosoft .NET Framework Version 4.0 or later.
Before you install the XenServer VM Tools for Windows, ensure that your VM is configured to receive
the I/O drivers from Windows Update. Windows Update is the recommended way to receive updates
to the I/O drivers. However, if Windows Update is not an available option for your VM, you can also
receive updates to the I/O drivers through other means. For more information, see XenServer VM Tools
for Windows.
1. We recommend that you snapshot your VM before installing or updating the XenServer VM Tools.
2. Download the XenServer VM Tools for Windows file from the XenServer Downloads page.
4. Copy the file to your Windows VM or to a shared drive that the Windows VM can access.
a) Follow the instructions on the wizard to accept the license agreement and choose a desti‑
nation folder.
b) The wizard displays the recommended settings on the Installation and Updates Settings
page. For information about customizing these settings, see XenServer VM Tools for Win‑
dows.
c) Click Next and then Install to begin the XenServer VM Tools for Windows installation
process.
vTPM
XenServer enables you to create a virtual Trusted Platform Module (vTPM) and attach it to your Win‑
dows 10 or Windows 11 VM. This virtual TPM does not use or pass through any physical TPMs on your
hardware. A physical TPM is not required to be able to create a virtual TPM.
Windows 11 VMs require the presence of a linked vTPM. This vTPM is created automatically when the
Windows 11 VM is created from the provided template. For Windows 10 VMs the vTPM is optional.
A VM has a one‑to‑one relationship with its linked vTPM. A VM can only have one vTPM and a vTPM can
only be associated with a single VM. Users with the VM Admin and above roles can create and destroy
vTPM instances.
Applications running on the VM can access the vTPM through the TPM 2.0 compliant API. TPM 1.2 is
not supported. Users with the VM Operator and above roles can access the vTPM through the VM.
To check if your VM has a linked vTPM, in XenCenter go to the General tab and look in the Device
Security section.
Constraints
The following constraints currently apply to VMs created with an attached vTPM:
• While you can export your VMs to OVF/OVA format, any data in your vTPM is lost as part of this
process. This lost data can cause the VM to show unexpected behaviors or can prevent it from
starting. If you are using any vTPM features in the VM, do not export your VMs using this format.
• BitLocker is not currently supported for VMs with a vTPM attached.
• vTPM operations performed by the user or Windows in the background might fail if the the pool
coordinator is offline.
• If a VM is running a custom workload that uses the vTPM, and that workload writes a large
amount of data or makes a large number of write requests to the vTPM, this might impact the
performance of the XenServer toolstack.
For new Windows 11 VMs and Windows 10 VMs, the vTPM can be added during VM creation. For more
information, see the documentation for your preferred VM creation method.
If you have an existing UEFI or UEFI Secure Boot Windows 10 VM that you want to add a vTPM to, you
can do it by using XenCenter or by using the xe CLI. If you want to upgrade the operating system of
the VM to one that requires a vTPM, you must attach the vTPM to the VM before you upgrade your VM
operating system.
By using XenCenter
a) Right‑click on the VM and select Manage vTPMs. Or, on the main menu bar, go to VM >
Manage vTPMs. The TPM Manager dialog opens.
b) In the TPM Manager dialog, add a vTPM.
3. To verify that the VM has a linked vTPM, select the VM and go to its General tab and look in the
Device Security section.
4. Start the Windows 10 VM.
1 xe vm-shutdown uuid=<vm_uuid>
1 xe vtpm-create vm-uuid=<vm_uuid>
1 xe vm-start uuid=<vm_uuid>
Upgrades to VMs are typically required when moving to a newer version of XenServer.
1. If you are updating your operating system to a version of Windows that requires a vTPM (such
as Windows 11), you must attach a vTPM to your VM before upgrading its operating system. For
more information, see Attach a vTPM to a Windows VM.
2. Upgrade XenServer VM Tools for Windows to the latest version on the VM. For more information,
see XenServer VM Tools for Windows.
We recommend that you do not remove the XenServer VM Tools from your Windows VM before
automatically updating the version of Windows on the VM.
You can upgrade your Windows VMs in one of the following ways:
• Use Windows Update to upgrade the version of the Windows operating system on your Windows
VMs. If you use Windows Update to update your XenServer VM Tools, we recommend you use
this method.
• Use the Windows installation ISO for the newer versions. Windows installation disks typically
provide an upgrade option if you boot them on a server which has an earlier version of Windows
already installed.
The only supported way to clone a Windows VM is by using the Windows utility sysprep to prepare
the VM.
The sysprep utility changes the local computer SID to make it unique to each computer. The
sysprep binaries are in the C:\Windows\System32\Sysprep folder.
For more information about using Sysprep, see Sysprep (Generalize) a Windows installation.
On Windows 10 and 11, the Windows first‑time setup or Out‑Of‑Box‑Experience (OOBE), installs
applications (such as AppX) that can interfere with the sysprep process. Because of this be‑
havior, when creating a clonable VM, we recommend skipping the first‑time setup and starting
Windows in audit mode instead.
2. Install Windows.
3. (Optional) When the Out‑Of‑Box‑Experience (OOBE) starts on the page that asks for region infor‑
mation, press Ctrl + Shift + F3. Windows starts in audit mode. For more information, see Boot
Windows to Audit mode or OOBE.
While not required, we recommend that you exit OOBE to avoid creating an unneeded user ac‑
count on the image and to avoid issues with third‑party application compatibility. If you con‑
tinue with OOBE, some applications or Windows Updates that are installed during OOBE might
prevent Sysprep from operating correctly.
6. Run sysprep to generalize the VM. This utility shuts down the VM when it completes.
Note:
Do not restart the original, generalized VM (the “source”VM) again after the sysprep stage. Im‑
mediately convert it to a template afterwards to prevent restarts. If the source VM is restarted,
sysprep must be run on it again before it can be safely used to make more clones.
3. When the cloned VM starts, it completes the following actions before being available for use:
There are many versions and variations of Windows with different levels of support for the features
provided by XenServer. This section lists notes and errata for the known differences.
• When installing Windows VMs, start off with no more than three virtual disks. After the VM and
XenServer VM Tools for Windows have been installed, you can add extra virtual disks. Ensure
that the boot device is always one of the initial disks so that the VM can successfully boot without
the XenServer VM Tools for Windows.
• When the boot mode for a Windows VM is BIOS boot, Windows formats the primary disk with
a Master Boot Record (MBR). MBR limits the maximum addressable storage space of a disk to 2
TiB. To use a disk that is larger than 2 TiB with a Windows VM, do one of the following things:
– If UEFI boot is supported for the version of Windows, ensure that you use UEFI as the boot
mode for the Windows VM.
– Create the large disk as the secondary disk for the VM and select GUID Partition Table (GPT)
format.
• Multiple vCPUs are exposed as CPU sockets to Windows guests, and are subject to the licensing
limitations present in the VM. The number of CPUs present in the guest can be confirmed by
checking the Device Manager. The number of CPUs actually being used by Windows can be
seen in the Task Manager.
• The disk enumeration order in a Windows guest might differ from the order in which they were
initially added. This behavior is because of interaction between the I/O drivers and the Plug‑
and‑Play subsystem in Windows. For example, the first disk might show up as Disk 1, the
next disk hot plugged as Disk 0, a later disk as Disk 2, and then upwards in the expected
fashion.
• A bug in the VLC player DirectX back‑end replaces yellow with blue during video playback when
the Windows display properties are set to 24‑bit color. VLC using OpenGL as a back‑end works
correctly, and any other DirectX‑based or OpenGL‑based video player works too. It is not a prob‑
lem if the guest is set to use 16‑bit color rather than 24.
• The PV Ethernet Adapter reports a speed of 100 Gbps in Windows VMs. This speed is an arti‑
ficial hardcoded value and is not relevant in a virtual environment because the virtual NIC is
connected to a virtual switch. The Windows VM uses the full speed that is available, but the
network might not be capable of the full 100 Gbps.
• If you attempt to make an insecure RDP connection to a Windows VM, this action might fail with
the following error message: “This could be due to CredSSP encryption oracle remediation.”
This error occurs when the Credential Security Support Provider protocol (CredSSP) update is
applied to only one of the client and server in the RDP connection. For more information, see
https://support.microsoft.com/en‑gb/help/4295591/credssp‑encryption‑oracle‑remediation‑
error‑when‑to‑rdp‑to‑azure‑vm.
July 5, 2024
XenServer VM Tools (formerly Citrix VM Tools or XenServer PV Tools) for Windows provide high per‑
formance I/O services without the overhead of traditional device emulation. XenServer VM Tools for
Windows consist of I/O drivers (also known as paravirtualized drivers or PV drivers) and the Manage‑
ment Agent.
XenServer VM Tools for Windows must be installed on each Windows VM for the VM to have a fully
supported configuration. A VM functions without them, but performance is hampered.
The version of the XenServer VM Tools for Windows is updated independently of the version of
XenServer. To be in support, ensure that your XenServer VM Tools for Windows are regularly updated
to the latest version, both in your VMs and in any templates that you use to create your VMs. For more
information about the latest version of the tools, see What’s new.
To install XenServer VM Tools for Windows on a Windows VM, the VM must be running the Mi‑
crosoft .NET Framework Version 4.0 or later.
The XenServer VM Tools for Windows are installed by default in the C:\Program Files\
XenServer\XenTools directory on the VM.
1. We recommend that you snapshot your VM before installing or updating the XenServer VM Tools.
2. Download the XenServer VM Tools for Windows file from the XenServer Downloads page.
4. Copy the file to your Windows VM or to a shared drive that the Windows VM can access.
• Follow the instructions on the wizard to accept the license agreement and choose a desti‑
nation folder.
For some use cases, different update settings are recommended. For more information,
see Update XenServer VM Tools.
To configure the update settings, you can make the following changes:
– If you do not want to allow the automatic updating of the Management Agent, select
Disallow automatic Management Agent updates from the list.
– If you want to allow the Management Agent to update the I/O drivers automatically,
select Allow automatic I/O driver updates by the Management Agent. However,
we recommend that you use Windows Update to update the I/O drivers, not the Man‑
agement Agent. If you have chosen to receive I/O driver updates through the Windows
Update mechanism, do not allow the Management Agent to update the I/O drivers au‑
tomatically.
– If you do not want to share anonymous usage information with us, clear the Send
anonymous usage information to Cloud Software Group, Inc. checkbox. The in‑
formation transmitted to Cloud Software Group contains the first four characters of
the UUID of the VM requesting the update. No other information relating to the VM is
collected or transmitted.
• Click Next and then Install to begin the XenServer VM Tools for Windows installation
process.
Customers who install the XenServer VM Tools for Windows or the Management Agent through
RDP might not see the restart prompt as it only appears on the Windows console session. To
ensure that you restart your VM (if necessary) and to get your VM to an optimized state, specify
the force restart option in RDP. The force restart option restarts the VM only if it is required to
get the VM to an optimized state.
Warning:
Installing or upgrading the XenServer VM Tools for Windows can cause the friendly name and
identifier of some network adapters to change. Any software which is configured to use a particu‑
lar adapter might have to be reconfigured following XenServer VM Tools for Windows installation
or upgrade.
Silent installation
To install the XenServer VM Tools for Windows silently and to prevent the system from rebooting, run
the following command:
Notes:
• The /quiet parameter applies to the installation dialogs only, but not to the device dri‑
ver installation. When the /quiet parameter is specified, the device driver installation
requests permission to reboot if necessary.
– When /quiet /norestart is specified, the system doesn’t reboot after the entire
tools installation is complete. This behavior is independent of what the user specifies
in the reboot dialog.
– When /quiet /forcerestart is specified, the upgrade or installation process can
trigger multiple reboots. This behavior is independent of what the user specifies in the
reboot dialog.
– When the device driver installation requests permission to reboot, a tools installation
with the quiet parameter specified can still be in progress. Use the Task Manager to
confirm whether the installer is still running.
To customize the installation settings, use the following parameters with the silent installation com‑
mands:
For example, to do a silent install of the tools that does not allow future automatic Management Agent
updates and does not send anonymous information to Cloud Software Group, Inc., run one of the
following commands:
For interactive, silent, and passive installations, following the next system restart there might be sev‑
eral automated reboots before the XenServer VM Tools for Windows are fully installed. This behavior is
also the case for installations with the /norestart flag specified. However, for installations where
the /norestart flag is provided, the initial restart might be manually initiated.
Ensure that your XenServer VM Tools for Windows are regularly updated to the latest version, both in
your VMs and in any templates that you use to create your VMs. We recommend that you snapshot
your VM before updating the XenServer VM Tools. For more information about the latest version of
the tools, see What’s new.
Important:
Ensure that all requested VM restarts are completed as part of the update. Multiple restarts might
be required. If all requested restarts are not completed, the VM might show unexpected behavior.
The update method to choose for each component of the tools can depend on your environment.
For most use cases, we recommend using the following settings for updating the different compo‑
nents of the XenServer VM Tools for Windows:
3. Set the value of the following registry key to a REG_DWORD value of ‘3’: HLKM\System\
CurrentControlSet\services\xenbus_monitor\Parameters\Autoreboot.
During installation:
The first two settings are the default when you run the installer:
If you intend to use your Windows VM as a Citrix Provisioning target or with the reset‑on‑boot flag set,
you cannot use any of the automated update mechanisms. We recommend that you set the following
configuration on the master template that you use to create these VMs:
1. During creation of your VM, ensure that the has-vendor-device flag is set to false.
During installation:
You can configure the Management Agent to update both itself and the I/O drivers. If you use this con‑
figuration, ensure that the VMs are prevented from updating the I/O drivers through Windows Update.
If both mechanisms attempt to update the I/O drivers, this can result in unnecessary updates.
Choose this approach if your organization requires that you review any updates before applying them
to your Windows VMs. If this is the case, you must also redirect the Management Agent to get its up‑
dates from an internal server.
During installation:
XenServer enables you to update the Management Agent automatically on both new and existing Win‑
dows VMs. By default, XenServer allows the automatic updating of the Management Agent. However,
it does not allow the Management Agent to update the I/O drivers automatically. You can customize
the Management Agent update settings during XenServer VM Tools for Windows installation. The au‑
tomatic updating of the Management Agent occurs seamlessly, and does not reboot your VM. In sce‑
narios where a VM reboot is required, a message appears on the Console tab of the VM notifying users
about the required action.
You can get the Management Agent updates automatically, provided the Windows VM has access to
the internet.
Manage Automatic Updates by using the CLI XenServer enables you to use the command line to
manage the automatic updating of the I/O drivers and the Management Agent. You can run msiexec
.exe with the arguments listed in the following table to specify whether the I/O drivers and the Man‑
agement Agent are automatically updated. For information about installing XenServer VM Tools for
Windows by using msiexec.exe, see Silent installation.
Note:
For VMs managed using either PVS or MCS, automated updates are turned off automatically when
the Citrix Virtual Desktops VDA is present and it reports that the machine is non‑persistent.
Enable Management Agent updates To enable automatic updating of the Management Agent on
a per‑VM basis:
3. Ensure that Management Agent updates are allowed by your pool. In the host console, run the
following command:
Disable Management Agent updates To disable automatic updating of the Management Agent on
a per‑VM basis:
To disable automatic updating of the Management Agent on a per‑pool basis, run the following com‑
mand in the host console:
Redirect the Management Agent updates XenServer enables customers to redirect Management
Agent updates to an internal web server before they are installed. This redirection allows customers
to review the updates before they are automatically installed on the VM.
The Management Agent uses an updates file to get information about the available updates. The name
of this updates file depends on the version of the Management Agent that you use:
2. Download the Management Agent MSI files referenced in the updates file.
3. Upload the MSI files to an internal web server that your VMs can access.
4. Update the updates file to point to the MSI files on the internal web server.
Automatic updates can also be redirected on a per‑VM or a per‑pool basis. To redirect updates on a
per‑VM basis:
To redirect automatic updating of the Management Agent on a per‑pool basis, run the following com‑
mand:
You can update the I/O drivers through Windows Update or by using the Management Agent. You can
also turn off automatic updates and manage updates to the I/O drivers manually.
Each of the I/O drivers (xennet, xenvif, xenvbd, xeniface, and xenbus) has its own version. For infor‑
mation about the latest versions, see What’s New.
Set the I/O drivers to update through Windows Update You can get I/O driver updates automati‑
cally from Microsoft Windows Update, provided:
• The VM has access to the internet, or it can connect to a WSUS proxy server
• You are not running the Core version of Windows Server. Windows Server Core does not support
using Windows Update to install or update the I/O drivers.
The Virtualization state section on a VM’s General tab in XenCenter specifies whether the VM can
receive updates from Windows Update. The mechanism to receive I/O driver updates from Windows
Update is turned on by default. If you do not want to receive I/O driver updates from Windows Update,
disable Windows Update on your VM, or specify a group policy.
Disable update of the I/O drivers through Windows Update The Virtualization state section on
a VM’s General tab in XenCenter specifies whether the VM can receive updates from Windows Update.
The mechanism to receive I/O driver updates from Windows Update is turned on by default.
For Windows VMs that already exist, if you do not want to receive I/O driver updates from Windows
Update, specify a group policy.
For new Windows VMs, you can set a flag in the VM during VM creation to prevent I/O driver updates
from Windows Update. For more information, see Settings for Citrix Provisioning targets or reset‑on‑
boot machines and Create a Windows VM by using the CLI.
Set the Management Agent to update the I/O drivers During the XenServer VM Tools for Windows
installation, you can specify for the Management Agent to update the I/O drivers automatically. If you
prefer to update this setting after completing the XenServer VM Tools for Windows installation process,
perform the following steps:
Stop the Management Agent from updating the I/O drivers To prevent the Management Agent
from updating the I/O drivers, perform the following steps:
Automatic reboots
Ensure that all requested VM restarts are completed as part of the update. Multiple restarts might be
required. If all requested restarts are not completed, you might see unexpected behavior.
You can set a registry key that specifies the maximum number of automatic reboots that are performed
when you install the drivers through Device Manager or Windows Update. After you have installed the
xenbus driver version 9.1.1.8 or later, the XenServer VM Tools for Windows use the guidance provided
by this registry key. If you have an earlier version of xenbus, you might still experience unexpected
behavior. If this occurs, reboot the VM from XenCenter.
To use this feature, we recommend that you set the following registry key as soon as possible:
HLKM\System\CurrentControlSet\services\xenbus_monitor\Parameters\
Autoreboot. The value of the registry key must be a positive integer. We recommend that you set
the number of reboots in the registry key to 3.
When this registry key is set, the XenServer VM Tools for Windows perform as many reboots as are
needed to complete the updates or the number of reboots specified by the registry key ‑ whichever
value is lower.
Before each reboot, Windows can display an alert for 60 seconds that warns of the upcoming reboot.
You can dismiss the alert, but this action does not cancel the reboot. Because of this delay between
the reboots, wait a few minutes after the initial reboot for the reboot cycle to complete.
Notes:
This automatic reboot feature only applies to updates to the Windows I/O drivers through Device
Manager or Windows Update. If you are using the Management Agent installer to deploy your
drivers, the installer disregards this registry key and manages the VM reboots according to its
own settings.
If, after waiting for all reboots to complete, you still experience unexpected behavior, initiate a
reboot of the VM from XenCenter to attempt to restore the configuration.
Setting automatic reboots using the command line On your Windows VM, open a command
prompt as Administrator and run the following command:
Alternatively, if your Windows VM is configured to allow remote access, you can run the following com‑
mand from an Administrator command prompt on another system:
1. From the Windows Start menu, open the Registry Editor and navigate to the key: HLKM\
System\CurrentControlSet\services\xenbus_monitor\Parameters.
2. Create a new subkey of the type REG_DWORD with the name: Autoreboot.
3. Set the value of Autoreboot to an integer, for example, 3.
To find out the version of the I/O drivers installed on the VM:
1. Navigate to C:\Windows\System32\drivers.
The File version field displays the version of the driver installed on the VM.
To find out the version of the Management Agent installed on the VM:
2. Right‑click XenGuestAgent from the list and click Properties and then Details.
The File version field displays the version of the Management Agent installed on the VM.
During the XenServer VM Tools for Windows installation, you can specify whether you would like to
send anonymous usage information to Cloud Software Group, Inc. If you prefer to update this set‑
ting after completing the XenServer VM Tools for Windows installation process, perform the following
steps:
We provide a tool, xtbugtool, that captures diagnostic information for the XenServer VM Tools. For
more information, see Troubleshoot VM problems.
We don’t recommend removing the XenServer VM Tools from your Windows VMs. These tools are
required for your Windows VMs to be fully supported. Removing them can cause unexpected behavior.
Manually uninstall your XenServer VM Tools only as a last resort.
Standard uninstall
To do a standard uninstall of the XenServer VM Tools, you can use the Windows Add or Remove Pro‑
grams feature:
Uninstalling the XenServer VM Tools by using the Windows Add or Remove Programs feature calls
the <tools-install-directory>\uninstall.exe file to perform the uninstall actions. You
can instead choose to call this command from a PowerShell terminal or a command prompt with
administrator privileges.
The latest version of XenServer VM Tools for Windows (9.3.1 and later) includes the command
uninstall.exe purge. The purge option on the uninstall.exe application resets a VM to
the state before any of the I/O drivers were installed. If you are experiencing issues when upgrading
your tools to a newer version or need a clean state to install a later set of tools on your VM, use this
utility.
After using this command, you do not need to perform any manual cleanup steps like you might have
had to with previous versions of the XenServer VM Tools. All changes related to the XenServer VM
Tools have been removed.
What does the purge option remove? If you use the command uninstall.exe purge, all
traces of the XenServer VM Tools are removed from your Windows VM. The list of actions taken by this
command are as follows:
• Services:
– Disables all XenServer VM Tools services, which prevents installed drivers and services
from starting on reboot.
– Stops any running XenServer VM Tools services.
• Drivers:
• Registry:
– Removes stale registry information used by out of support versions of the drivers.
– Deletes tools‑related keys from HKLM\System\CurrentControlSet\Control\
Class\...
– Deletes tools‑related keys from HKLM\System\CurrentControlSet\Services.
– Deletes tools‑related keys from HKLM\System\CurrentControlSet\Enum\...
• Files:
• Other:
– Deletes old entires in Add or Remove Programs. This action is the same as that performed
the cleanup command line option.
– Clears some of the InstallAgent’s stale state information.
– Removes xenfilt.sys from upper‑filters. This change prevents xenfilt.sys from
loading on any driver nodes.
– Removes the unplug keys, which causes the VM to revert to emulated devices on reboot.
– Removes StorNvme’s StartOverride. This change forces stornvme.sys to start on boot
and allows emulated NVMe (UEFI) boot devices to function.
What’s new
The version of the XenServer VM Tools for Windows is updated independently of the version of
XenServer. Ensure that your XenServer VM Tools for Windows are regularly updated to the latest
version, both in your VMs and in any templates that you use to create your VMs.
The latest version of the XenServer VM Tools for Windows is available from the XenServer Downloads
page.
• Installer: 9.3.3
• Management Agent: 9.2.3.60
• xenbus: 9.1.8.88
• xeniface: 9.1.9.78
• xennet: 9.1.6.60
• xenvbd: 9.1.7.66
• xenvif: 9.1.11.92
Fixed issues in 9.3.3 This release includes fixes for the following issues:
• Sometimes, the Management Agent can crash with a ManagementException when the VM is
under heavy load.
• On Windows 2022 Servers, a single vCPU can consume 100% CPU. As a result, the server be‑
comes unresponsive.
• Windows VMs hosted in a pool that uses OpenVSwitch networking and VLAN tagged ethernet
frames can have inconsistent network connectivity.
Earlier releases
• Installer: 9.3.2
• Management Agent: 9.2.2.435
• xenbus: 9.1.7.80
• xeniface: 9.1.8.69
• xennet: 9.1.5.51
• xenvbd: 9.1.6.58
• xenvif: 9.1.10.83
• Sometimes, when installing the XenServer VM Tools, a non‑fatal error can cause the installation
to fail.
• Installer: 9.3.1
• Management Agent: 9.2.1.35
• xenbus: 9.1.5.54
• xeniface: 9.1.5.42
• xennet: 9.1.3.34
• xenvbd: 9.1.4.37
• xenvif: 9.1.8.58
• Improvements to the uninstall.exe utility, including the purge parameter. For more in‑
formation, see Uninstall XenServer VM Tools.
• General improvements to the XenServer VM Tools installer.
• General improvements to string handling of registry keys.
• Sometimes, when the XenServer VM Tools are updated through Windows Update, the static IP
settings are lost and the network settings change to use DHCP.
• On Windows VMs, the grant tables can easily become exhausted. When this occurs, read and
write requests can fail or additional VIFs are not enabled correctly and fail to start.
• On rare occasions, when upgrading the XenServer VM Tools for Windows, the existing Manage‑
ment Agent can fail to shut down and prevent the upgrade from succeeding.
• On a Windows VM, you might see both the previous and a later version of the tools or Manage‑
ment Agent listed in your Installed Programs.
After you update to the latest version of the tools, neither of these earlier names are listed. Only
XenServer VM Tools is listed in your Installed Programs.
• Installer: 9.3.0
• Management Agent: 9.2.0.27
• xenbus: 9.1.4.49
• xeniface: 9.1.4.34
• xennet: 9.1.3.34
• xenvbd: 9.1.3.33
• xenvif: 9.1.6.52
• Security software was blocking secondary disks that are marked as removable from being ex‑
posed to the OS, as a data‑exfiltration prevention measure. This update enables you to flag a
VBD as non‑removable and have this correctly exposed through the OS.
• On a Windows VM, sometimes the IP address of an SR‑IOV VIF is not visible in XenCenter.
• Installer: 9.2.3
• Management Agent: 9.1.1.13
• xenbus: 9.1.3.30
• xeniface: 9.1.4.34
• xennet:
– 9.1.1.8 (for Windows Server 2012 and Windows Server 2012 R2)
– 9.1.2.23 (for all other supported Windows operating systems)
• xenvbd: 9.1.2.20
• xenvif: 9.1.5.48
• In XenServer VM Tools for Windows version 9.2.2, time sync options are not available.
• A race condition can cause Windows VMs to show a blue screen error after live migration on Citrix
Hypervisor 8.2 Cumulative Update 1.
• Windows VMs that have version 9.2.1 or 9.2.2 of the XenServer VM Tools installed and that are
PVS targets can sometimes freeze with a black screen. The message “Guest Rx stalled”is present
in the dom0 kernel logs. This issue more often occurs on pool coordinators than on other pool
members.
• On Windows VMs with more than 8 vCPUs, Receive Side Scaling might not work because the
xenvif driver fails to set up the indirection table.
• Installer: 9.2.2
• Management Agent: 9.1.1.13
• xenbus: 9.1.3.30
• xeniface: 9.1.2.22
• xennet:
– 9.1.1.8 (for Windows Server 2012 and Windows Server 2012 R2)
– 9.1.2.23 (for all other supported Windows operating systems)
• xenvbd: 9.1.2.20
• xenvif: 9.1.3.31
• During an update of the tools, the xenbus driver can prompt a reboot before driver installation
is complete. Accepting the reboot can cause a blue screen error in your Windows VM.
• When compressing collected diagnostic information, the xt‑bugtool diagnostics tool times out
after 20s. This behavior can result in the diagnostics zip file not being correctly created.
• VNC clipboard sharing doesn’t work.
• The previous versions of the drivers were not released through Windows Update.
• Installer: 9.2.1
• Management Agent: 9.1.0.10
• xenbus: 9.1.2.14
• xeniface: 9.1.1.11
• xennet: 9.1.1.8
• xenvbd: 9.1.1.8
• xenvif: 9.1.2.16
Note:
Linux VMs
When you want to create a Linux VM, create the VM using a template for the operating system you
want to run on the VM. You can use a template that XenServer provides for your operating system, or
one that you created previously. You can create the VM from either XenCenter or the CLI. This section
focuses on using the CLI.
Note:
To create a VM of a newer minor update of a RHEL release than is supported for installation by
XenServer, complete the following steps:
This process also applies to RHEL derivatives such as CentOS and Oracle Linux.
We recommend that you install the XenServer VM Tools for Linux immediately after installing the op‑
erating system. For more information, see Install XenServer VM Tools for Linux.
The overview for creating a Linux VM is as following:
1. Create the VM for your target operating system using XenCenter or the CLI.
2. Install the operating system using vendor installation media.
3. Install the XenServer VM Tools for Linux (recommended).
4. Configure the correct time and time zone on the VM and VNC as you would in a normal non‑
virtual environment.
Warning:
The Other install media template is for advanced users who want to attempt to install VMs run‑
ning unsupported operating systems. XenServer has been tested running only the supported dis‑
tributions and specific versions covered by the standard supplied templates. Any VMs installed
using the Other install media template are not supported.
For information regarding specific Linux distributions, see Installation notes for Linux distributions.
For a list of supported Linux distributions, see Guest operating system support.
Other Linux distributions are not supported. However, distributions that use the same installation
mechanism as Red Hat Enterprise Linux (for example, Fedora Core) might be successfully installed
using the same template.
Create a Linux VM
This section includes procedures for creating a Linux VM by installing the OS from a physical CD/DVD
or from a network‑accessible ISO.
This section shows the CLI procedure for creating a Linux VM by installing the OS from a physical
CD/DVD or from a network‑accessible ISO.
Tha value of mode can be either BIOS or uefi and defaults to uefi if that option is supported
for your VM operating system. Otherwise, the mode defaults to BIOS. The value of option
can be set to either true or false. If you do not specify the Secure Boot option, it defaults to
auto.
For more information, see Guest UEFI boot and Secure Boot.
• If you are installing from a CD or DVD, get the name of the physical CD drive on the
XenServer host:
1 xe cd-list
The result of this command gives you something like SCSI 0:0:0:0 for the name-label
field.
• If you are installing from a network‑accessible ISO, use the name of the ISO from the ISO
library‑label as the value for the cd-name parameter:
4. Insert the operating system installation CD into the CD drive on the XenServer host.
5. Open a console to the VM with XenCenter or an SSH terminal and follow the steps to perform
the OS installation.
6. Start the VM. It boots straight into the operating system installer:
1 xe vm-start uuid=UUID
7. Install the guest utilities and configure graphical display. For more information, see Install the
XenServer VM Tools for Linux.
1. On the XenCenter toolbar, click the New VM button to open the New VM wizard.
The New VM wizard allows you to configure the new VM, adjusting various parameters for CPU,
storage, and networking resources.
2. Select a VM template and click Next.
Each template contains the setup information that is required to create a VM with a specific
guest operating system (OS), and with optimum storage. This list reflects the templates that
XenServer currently supports.
Note:
If the OS that you are installing on your VM is compatible only with the original hardware,
check the Copy host BIOS strings to VM box. For example, you might use this option for
an OS installation CD that was packaged with a specific computer.
After you first start a VM, you cannot change its BIOS strings. Ensure that the BIOS strings
are correct before starting the VM for the first time.
To copy BIOS strings using the CLI, see Install VMs from Reseller Option Kit (BIOS‑locked) Media.
Advanced users can set user‑defined BIOS strings. For more information, see User‑defined BIOS
strings.
3. Enter a name and an optional description for the new VM.
4. Choose the source of the OS media to install on the new VM.
Installing from a CD/DVD is the simplest option for getting started.
XenServer also allows you to pull OS installation media from a range of sources, including a
pre‑existing ISO library.
To attach a pre‑existing ISO library, click New ISO library and indicate the location and type of
the ISO library. You can then choose the specific operating system ISO media from the list.
5. In the Installation Media tab, you can choose a boot mode for the VM. By default, XenCenter
selects the most secure boot mode available for the VM operating system version.
Notes:
• The UEFI Boot and UEFI Secure Boot options appear grayed out if the VM template
you have chosen does not support UEFI boot.
• You cannot change the boot mode after you boot the VM for the first time.
For more information, see Guest UEFI boot and Secure Boot.
A home server is the host which provides the resources for a VM in a pool. When you nominate
a home server for a VM, XenServer attempts to start the VM on that host. If this action is not
possible, an alternate host within the same pool is selected automatically. To choose a home
server, click Place the VM on this server and select a host from the list.
Notes:
• In WLB‑enabled pools, the nominated home server isn’t used for starting, restarting,
resuming, or migrating the VM. Instead, Workload Balancing nominates the best host
for the VM by analyzing XenServer resource pool metrics and by recommending opti‑
mizations.
• If a VM has one or more virtual GPUs assigned to it, the home server nomination doesn’
t take effect. Instead, the host nomination is based on the virtual GPU placement pol‑
icy set by the user.
• During rolling pool upgrade, the home server is not considered when migrating the
VM. Instead, the VM is migrated back to the host it was on before the upgrade.
If you do not want to nominate a home server, click Don’t assign this VM a home
server. The VM is started on any host with the necessary resources.
7. Allocate processor and memory resources for the VM. Click Next to continue.
If vGPU is supported, the New VM wizard prompts you to assign a dedicated GPU or one or more
virtual GPUs to the VM. This option enables the VM to use the processing power of the GPU. With
this feature, you have better support for high‑end 3D professional graphics applications such as
CAD/CAM, GIS, and Medical Imaging applications.
Click Next to select the default allocation (24 GB) and configuration, or you might want to do
the following extra configuration:
• Change the name, description, or size of your virtual disk by clicking Edit.
Click Next to select the default NIC and configurations, including an automatically created
unique MAC address for each NIC. Alternatively, you might want to do the following extra
configuration:
• Change the physical network, MAC address, or Quality of Service (QoS) priority of the vir‑
tual disk by clicking Edit.
• Add a new virtual NIC by selecting Add.
11. Review settings, and then click Create Now to create the VM and return to the Search tab.
An icon for your new VM appears under the host in the Resources pane.
On the Resources pane, select the VM, and then click the Console tab to see the VM console.
13. After the OS installation completes and the VM reboots, install the XenServer VM Tools for Linux.
You can use PXE boot to install the operating system of your Linux VM. This approach can be useful
when you have to create many Linux VMs.
To install by using PXE boot, set up the following prerequisites in the network where your Linux VMs
are located:
• DHCP server that is configured to direct any PXE boot installation requests to the TFTP server
• TFTP server that hosts the installation files for the Linux operating system
2. Set the boot order to boot from the disk and then from the network:
1 xe vm-start uuid=<UUID>
4. Install the guest utilities and configure graphical display. For more information, see Install the
XenServer VM Tools for Linux.
For more information about using PXE boot to install Linux operating systems, see the operating sys‑
tem documentation:
Although all supported Linux distributions are natively paravirtualized (and don’t need special drivers
for full performance), XenServer VM Tools for Linux provide a guest agent. This guest agent provides
extra information about the VM to the host. Install the guest agent on each Linux VM to benefit from
the following features:
For example, the following memory performance values are visible in XenCenter only when the
XenServer VM Tools are installed: “Used Memory”, “Disks”, Network”and “Address”.
Note:
You cannot use the Dynamic Memory Control (DMC) feature on Red Hat Enterprise Linux 8,
Red Hat Enterprise Linux 9, Rocky Linux 8, Rocky Linux 9, or CentOS Stream 9 VMs as these
operating systems do not support memory ballooning with the Xen hypervisor.
It is important to keep the Linux guest agent up‑to‑date as you upgrade your XenServer host. For more
information, see Update Linux kernels and guest utilities.
Note:
Before installing the guest agent on a SUSE Linux Enterprise Desktop or Server 15 guest, ensure
that insserv-compat-0.1-2.15.noarch.rpm is installed on the guest.
1. Download the XenServer VM Tools for Linux file from the XenServer Downloads page.
1 /<extract-directory>/install.sh
5. If the kernel has been upgraded, or the VM was upgraded from a previous version, reboot the
VM now.
From version 8.4.0‑1, you can use the install.sh script to uninstall XenServer VM Tools for Linux.
To uninstall the tools, run the following command as the root user:
1 /<extract-directory>/install.sh -u
To install third‑party drivers in a Linux VM that has UEFI Secure Boot enabled, you must create a signing
key, add it to the VM as a machine owner key (MOK), and use that key to sign the driver. For example,
if you use the XenServer graphics capabilities with your Linux VM, you might need to install the NVIDIA
graphics driver on your VM.
Complete the following steps to create a key and use it to install a third‑party driver:
The following example shows this procedure in detail for an NVIDIA graphics driver on a secure‑boot‑
enabled Ubuntu VM:
1 mkdir -p /root/module-signing
You are asked to create a password during this step. When you next boot, you are prompted to
provide the password you create here.
9. Install the NVIDIA driver, specifying the keys you created as the module signing keys:
This section lists vendor‑specific, configuration information to consider before creating the specified
Linux VMs.
For more detailed release notes on all distributions, see Linux VM Release Notes.
The new template for these guests specifies 2 GB RAM. This amount of RAM is a requirement for a
successful install of v7.4 and later. For v7.0 ‑ v7.3, the template specifies 2 GB RAM, but as with previous
versions of XenServer, 1 GB RAM is sufficient.
Note:
This information applies to both Red Hat and Red Hat derivatives.
For infrequent or one‑off installations, it is reasonable to use a Debian mirror directly. However, if
you intend to do several VM installations, we recommend that you use a caching proxy or local mirror.
Either of the following tools can be installed into a VM.
Typically, when cloning a VM or a computer, unless you generalize the cloned image, attributes unique
to that machine are duplicated in your environments. Some of the unique attributes that are dupli‑
cated when cloning are the IP address, SID, or MAC address.
As a result, XenServer automatically changes some virtual hardware parameters when you clone a
Linux VM. When you copy the VM using XenCenter, XenCenter automatically changes the MAC address
and IP address for you. If these interfaces are configured dynamically in your environment, you might
not need to modify the cloned VM. However, if the interfaces are statically configured, you might need
to modify their network configurations.
The VM may need to be customized to be made aware of these changes. For instructions for specific
supported Linux distributions, see Linux VM Release Notes.
Machine name
A cloned VM is another computer, and like any new computer in a network, it must have a unique
name within the network domain.
IP address
A cloned VM must have a unique IP address within the network domain it is part of. Generally, this
requirement is not a problem when DHCP is used to assign addresses. When the VM boots, the DHCP
server assigns it an IP address. If the cloned VM had a static IP address, the clone must be given an
unused IP address before being booted.
MAC address
There are two situations when we recommend disabling MAC address rules before cloning:
1. In some Linux distributions, the MAC address for the virtual network interface of a cloned VM is
recorded in the network configuration files. However, when you clone a VM, XenCenter assigns
the new cloned VM a different MAC address. As a result, when the new VM is started for the first
time, the network does recognize the new VM and does not come up automatically.
2. Some Linux distributions use udev rules to remember the MAC address of each network inter‑
face, and persist a name for that interface. This behavior is intended so that the same physical
NIC always maps to the same ethn interface, which is useful with removable NICs (like laptops).
However, this behavior is problematic in the context of VMs.
When the VM reboots, XenCenter shows just one NIC, but calls it eth0. Meanwhile the VM is
deliberately forcing this NIC to be eth1. The result is that networking does not work.
For VMs that use persistent names, disable these rules before cloning. If you do not want to turn off
persistent names, you must reconfigure networking inside the VM (in the usual way). However, the
information shown in XenCenter does not match the addresses actually in your network.
The Linux guest utilities can be updated by rerunning the install.sh script from the XenServer VM
Tools for Linux (see Install the XenServer VM Tools for Linux).
For yum‑enabled distributions, CentOS and RHEL, xe-guest-utilities installs a yum configura‑
tion file to enable subsequent updates to be done using yum in the standard manner.
When upgrading, we recommend that you always rerun install.sh. This script automatically de‑
termines if your VM needs any updates and installs if necessary.
Most modern Linux distributions support Xen paravirtualization directly, but have different installa‑
tion mechanisms and some kernel limitations.
To use the graphical installer, in XenCenter step through the New VM wizard. In the Installation Media
page, in the Advanced OS boot parameters section, add vnc to the list parameters:
You are prompted to provide networking configuration for the new VM to enable VNC communication.
Work through the remainder of the New VM wizard. When the wizard completes, in the Infrastructure
view, select the VM, and click Console to view a console session of the VM. At this point, it uses the
standard installer. The VM installation initially starts in text mode, and may request network configu‑
ration. Once provided, the Switch to Graphical Console button is displayed in the top right corner
of the XenCenter window.
After migrating or suspending the VM, RHEL 7 guests might freeze during resume. For more informa‑
tion, see Red Hat issue 1141249.
You cannot use the Dynamic Memory Control (DMC) feature on Red Hat Enterprise Linux 8, Red Hat
Enterprise Linux 9, Rocky Linux 8, Rocky Linux 9, or CentOS Stream 9 VMs as these operating systems
do not support memory ballooning with the Xen hypervisor.
CentOS 7
For the list of CentOS 7 release notes, see Red Hat Enterprise Linux 7.
Oracle Linux 7
For the list of Oracle Linux 7 release notes, see Red Hat Enterprise Linux 7.
Scientific Linux 7
For the list of Scientific Linux 7 release notes, see Red Hat Enterprise Linux 7.
Debian 10
If you install Debian 10 (Buster) by using PXE network boot, do not add console=tty0 to the boot
parameters. This parameter can cause issues with the installation process. Use only console=hvc0
in the boot parameters.
Note:
Before you prepare a SLES guest for cloning, ensure that you clear the udev configuration for
network devices as follows:
1 FORCE_PERSISTENT_NAMES=yes
To
1 FORCE_PERSISTENT_NAMES=no
• The General Availability (GA) kernel, which is not updated at point releases
• The Hardware Enablement (HWE) kernel, which is updated at point releases
Some minor versions of Ubuntu 18.04 (for example 18.04.2 and 18.04.3) use a HWE kernel by default
that can experience issues when running the graphical console. To work around these issues, you
can choose to run these minor versions of Ubuntu 18.04 with the GA kernel or to change some of
the graphics settings. For more information, see CTX265663 ‑ Ubuntu 18.04.2 VMs can fail to boot on
XenServer.
Migrate VMs
August 5, 2024
You can migrate a running VM by using live migration or storage live migration to move a VM’s Virtual
Disk Image (VDI) without any VM downtime.
The following sections describe the compatibility requirements and limitations of live migration and
storage live migration.
Live migration
Live migration is available in all versions of XenServer. This feature enables you to move a running
VM from one host to another host, when the VM’s disks (VDIs) are on storage shared by both hosts.
Pool maintenance features such as high availability and Rolling Pool Upgrade (RPU) can automatically
move VMs by using live migration. These features allow for workload leveling, infrastructure resilience,
and the upgrade of server software, without any VM downtime.
During the live migration of a VM, its memory is transferred as a data stream between two hosts using
the network. The migration stream compression feature compresses this data stream, speeding up
the memory transfer on slow networks. This feature is disabled by default, but this can be changed
by using XenCenter or the xe CLI. For more information, see Pool Properties ‑ Advanced and Pool para‑
meters. Alternatively, you can enable compression when migrating a VM by using the command line.
For more information, see the vm-migrate command in VM Commands.
The parallel host evacuation feature speeds up host evacuation time (during host updates) by moving
VMs off a host in parallel instead of sequentially. By default, this feature is enabled and the VMs are
migrated in batches of 10 in parallel. You can change the default batch size in the /etc/xapi.conf
file.
Note:
Storage can only be shared between hosts in the same pool. As a result VMs can only be migrated
to hosts in the same pool.
Notes:
Storage live migration allows a VM to be moved from one host to another, when the VM’s disks are not
on storage shared between the two hosts. As a result, VMs stored on local storage can be migrated
without downtime and VMs can be moved from one pool to another. This feature enables system
administrators to:
• Rebalance VMs between XenServer pools (for example from a development environment to a
production environment).
Note:
• Migrating a VM from one host to another preserves the VM state. The state information in‑
cludes information that defines and identifies the VM and the historical performance met‑
rics, such as CPU and network usage.
• To improve security, you can close TCP port 80 on the management interface of your
XenServer hosts. However, you cannot migrate a VM from a Citrix Hypervisor 8.2 CU1 pool
without hotfix XS82ECU1033 installed, to a XenServer pool with port 80 closed. To do so,
install XS82ECU1033 on your Citrix Hypervisor 8.2 CU1 pool or temporarily open port 80 on
your XenServer pool. For more information about how to close port 80, see Restrict use of
port 80.
Compatibility requirements
When migrating a VM with live migration or storage live migration, the new VM and server must meet
the following compatibility requirements.
General requirements:
• The target host must have the same or a more recent version of XenServer installed as the source
host.
• XenServer VM Tools for Windows must be installed on each Windows VM that you want to mi‑
grate.
• You cannot concurrently migrate more than three VMs that have their source location in the
same pool.
CPU requirements:
• If the CPUs on the source and target host are different, the target host must be at least as capable
as the source host. Generally, this means that the target has the same or a newer CPU.
– If you are migrating within the same pool, the pool automatically attempts to make a VM
compatible.
– If you are migrating between pools, you must ensure that the VM is compatible with the
feature set in the destination pool.
Memory requirements:
• The target host must have sufficient spare memory capacity or be able to free sufficient capacity
using Dynamic Memory Control. If there is not enough memory, the migration fails to complete.
• Storage migration only: A host in the source pool must have sufficient spare memory capacity
to run a halted VM that is being migrated. This requirement enables the halted VM to be started
at any point during the migration process.
• Storage live migration only: The target storage must have enough free disk space available for
the incoming VMs. The free space required can be three times the VDI size (without snapshots).
If there is not enough space, the migration fails to complete.
• The source storage must have enough free disk space to create temporary snapshots of the VM’
s VDIs during the migration. If there is not enough space, the migration fails to complete. The
free space required can be up to two times the size of the VM’s disk.
Live migration and storage live migration are subject to the following limitations and caveats:
• Storage live migration cannot be used with VMs created by Machine Creation Services.
• VMs using PCI pass‑through devices cannot be migrated (except in the case of NVIDIA SR‑IOV
GPUs). For more information, see Use SR‑IOV enabled NICs.
• VMs with attached vUSBs cannot be migrated.
• VMs with the parameter no-migrate set cannot be migrated.
• You cannot use storage live migration to migrate VMs that have changed block tracking enabled.
Disable changed block tracking before attempting storage live migration. For more information,
see Changed Block Tracking.
• VMs that have the on-boot option set to reset cannot be migrated. For more information,
see Intellicache.
• If you use the high availability feature and the VM being migrated is marked as protected, you
might receive a warning during live migration if the operation causes the HA constraints to not
be met.
• VM performance is reduced during migration.
• Time to completion of VM migration depends on the memory footprint of the VM, and its activity.
In addition, the size of the VDI and the storage activity of the VDI can affect VMs being migrated
with storage live migration. VMs with vGPUs attached migrate the entire vGPU state while the
VM is paused. We recommended that you use a fast network card on the management network
to reduce downtime, especially with vGPUs that have large amounts of memory.
• If live migration fails, for example, in the case of a network error, the VM on the source host can
instantly go to a halted state.
• To move a stopped VM: On the VM menu, select Move VM. This action opens the Move VM
wizard.
3. From the Home Server list, select a host to assign as the home server for the VM and click Next.
4. In the Storage tab, specify the storage repository where you would like to place the migrated
VM’s virtual disks, and then click Next.
• The Place all migrated virtual disks on the same SR radio button is selected by default
and displays the default shared SR on the destination pool.
• Click Place migrated virtual disks onto specified SRs to specify an SR from the Storage
Repository list. This option allows you to select different SR for each virtual disk on the
migrated VM.
5. From the Storage network list, select a network on the destination pool that is used for the live
migration of the VM’s virtual disks. Click Next.
Note:
Due to performance reasons, it is recommended that you do not use your management
network for live migration.
6. Review the configuration settings and click Finish to start migrating the VM.
If you are upgrading from 7.1 CU2 to 8.2 CU1, you might need to shut down and boot all VMs after
migrating your VMs, to ensure that new virtualization features are picked up.
Live VDI migration allows the administrator to relocate the VMs Virtual Disk Image (VDI) without shut‑
ting down the VM. This feature enables administrative operations such as:
• If you perform live VDI migration on a VM that has a vGPU, vGPU live migration is used. The host
must have enough vGPU space to make a copy of the vGPU instance on the host. If the pGPUs
are fully employed, VDI migration might not be possible.
• When you do a VDI live migration for a VM that remains on the same host, that VM temporarily
requires twice the amount of RAM.
1. In the Resources pane, select the SR where the Virtual Disk is stored and then click the Storage
tab.
2. In the Virtual Disks list, select the Virtual Disk that you would like to move, and then click Move.
3. In the Move Virtual Disk dialog box, select the target SR that you would like to move the VDI to.
Note:
Ensure that the SR has sufficient space for another virtual disk: the available space is
shown in the list of available SRs.
August 8, 2024
XenServer allows you to import VMs from and export them to various different formats.
Using the XenCenter Import wizard, you can import VMs from Open Virtualization Format (OVF and
OVA), disk image formats (VHD, VHDX/AVHDX, and VMDK), and XenServer XVA format. You can even
import VMs that have been created on other virtualization platforms, such as those offered by VMware
and Microsoft.
Note:
When importing VMs that have been created using other virtualization platforms, configure or fix
up the guest operating system to ensure that it boots on XenServer. The Operating System Fixup
feature in XenCenter aims to provide this basic level of interoperability. For more information,
see Operating system fixup.
Using the XenCenter Export wizard, you can export VMs to Open Virtualization Format (OVF and OVA)
and XenServer XVA format.
You can also use the xe CLI to import VMs from and export them to XenServer XVA format.
Requirements
To be able to import and export VMs to and from different formats, you require certain permissions.
The Import or Export wizard performs checks to ensure that you have a required role in the desti‑
nation pool before allowing you to continue. For more information about the RBAC roles that are
required, see RBAC roles and permissions.
Supported formats
• Share XenServer vApps and VMs with other virtualization platforms that support OVF
• There is a virtual disk image available without any associated OVF metadata
OVF is an open standard, specified by the Distributed Management Task Force, for packaging and dis‑
tributing a virtual appliance consisting of one or more VMs. For further details about OVF and OVA
formats, see the following information:
An OVF Package is the set of files that comprises the virtual appliance. It always includes a descriptor
file and any other files that represent the following attributes of the package:
Attributes Descriptor (.ovf): The descriptor always specifies the virtual hardware requirements
of the package. It may also specify other information, including:
• Descriptions of virtual disks, the package itself, and guest operating systems
• A license agreement
• Instructions to start and stop VMs in the appliance
• Instructions to install the package
Signature (.cert): The signature is the digital signature used by a public key certificate in the X.509
format to authenticate the author of the package.
Manifest (.mf): The manifest allows you to verify the integrity of the package contents. It contains
the SHA‑1 digests of every file in the package.
Virtual disks: OVF does not specify a disk image format. An OVF package includes files comprising vir‑
tual disks in the format defined by the virtualization product that exported the virtual disks. XenServer
produces OVF packages with disk images in Dynamic VHD format; VMware products and Virtual Box
produce OVF packages with virtual disks in Stream‑Optimized VMDK format.
OVF packages also support other non‑metadata related capabilities, such as compression, archiving,
EULA attachment, and annotations.
Note:
When importing an OVF package that has been compressed or contains compressed files, you
may need to free up extra disk space on the XenServer host to import it properly.
An Open Virtual Appliance (OVA) package is a single archive file, in the Tape Archive (.tar) format,
containing the files that comprise an OVF Package.
Select OVF or OVA format OVF packages contain a series of uncompressed files, which makes it
easier when you want to access individual disk images in the file. An OVA package contains one large
file, and while you can compress this file, it does not give you the flexibility of a series of files.
Using the OVA format is useful for specific applications for which it is beneficial to have just one file,
such as creating packages for Web downloads. Consider using OVA only as an option to make the
package easier to handle. Using this format lengthens both the export and import processes.
Using XenCenter, you can import disk images in the Virtual Hard Disk (VHD), Virtual Hard Disk Extended
(VHDX), Automatic Virtual Hard Disk (AVHDX), and Virtual Machine Disk (VMDK) formats. Exporting
standalone disk images is not supported.
VHD is a virtual hard disk format that is used to store the disk data for VMs. VMDK is a virtual disk format
that is specific to VMware. VHDX is an improved version of the VHD format. For more information
about VHDX/AVHDX, see VHDX/AVHDX.
You might choose to import a disk image when a virtual disk image is available without any associated
OVF metadata. This option might occur in the following situations:
• It is possible to import a disk image, but the associated OVF metadata is not readable
• You are moving from a platform that does not allow you to create an OVF package (for example,
older platforms or images)
• You want to import an older VMware appliance that does not have any OVF information
• You want to import a standalone VM that does not have any OVF information
When available, we recommend importing appliance packages that contain OVF metadata rather than
an individual disk image. The OVF data provides information that the Import wizard requires to recre‑
ate a VM from its disk image. This information includes the number of disk images associated with the
VM, processor, storage, network, and memory requirements. Without this information, it can be much
more complex and error‑prone to recreate the VM.
VHDX/AVHDX VHDX is an improved version of the VHD format that provides better performance,
fault tolerance, and data protection features in addition to a larger capacity.
AVHDX is a disk image format that is part of the VHDX standard for virtual hard disks. It is used to store
the snapshot or checkpoint information of VMs. Whenever you create a snapshot on a VM, an AVHDX
file is automatically generated to preserve the current state of the virtual hard disk. This file can be
used to track the snapshot information of VMs. Each AVHDX file is linked to the previous AVHDX file,
creating a chain that contains all changes made since the base virtual hard disk file.
Using the XenCenter Import wizard, you can import a VHDX/AVHDX file into a pool or specific host as
a VM. For information on how to use the XenCenter Import wizard to import a VHDX/AVHDX file, see
Import disk images.
If you are a Citrix customer, you can also use this feature to migrate your VMs from VMware to
XenServer. As part of its software streaming technology, Citrix Provisioning stores a shared disk
image (vDisk) as a VHDX/AVHDX file. By using the XenCenter Import wizard to import a VHDX/AVHDX
file, you can easily migrate your vDisk from VMware to XenServer. For more information, see Migrating
from VMware.
XVA format
XVA is a virtual appliance format specific to XenServer, which packages a single VM as a single set of
files, including a descriptor and disk images. The file name extension is .xva.
The descriptor (file name extension ova.xml) specifies the virtual hardware of a single VM.
The disk image format is a directory of files. The directory name corresponds to a reference name in
the descriptor and contains two files for each 1 MB block of the disk image. The base name of each
file is the block number in decimal. The first file contains one block of the disk image in raw binary
format and does not have an extension. The second file is a checksum of the first file. If the VM was
exported from Citrix Hypervisor 8.0 or earlier, this file has the extension .checksum. If the VM was
exported from Citrix Hypervisor 8.1 or later, this file has the extension .xxhash.
Important:
If a VM is exported from the XenServer host and then imported into another XenServer host with
a different CPU type, it may not run properly. For example, a Windows VM exported from a host
with an Intel® VT Enabled CPU might not run when imported into a host with an AMD‑VTM CPU.
When importing a virtual appliance or disk image created and exported from a virtualization platform
other than XenServer, you might have to configure the VM before it boots properly on the XenServer
host.
XenCenter includes an advanced hypervisor interoperability feature –Operating System Fixup –which
aims to ensure a basic level of interoperability for VMs that you import into XenServer. Use Operating
System Fixup when importing VMs from OVF/OVA packages and disk images created on other virtual‑
ization platforms.
The Operating System Fixup ISO is located in your XenCenter installation in the directory C:\
Program Files (x86)\XenServer\XenCenter\External Tools.
The Operating System Fixup process addresses the operating system device and driver issues inherent
when moving from one hypervisor to another. The process attempts to repair boot device‑related
problems with the imported VM that might prevent the operating system within from booting in the
XenServer environment. This feature is not designed to perform conversions from one platform to
another.
Note:
This feature requires an ISO storage repository with 40 MB of free space and 256 MB of virtual
memory.
Operating System Fixup is supplied as an automatically booting ISO image that is attached to the DVD
drive of the imported VM. It performs the necessary repair operations when the VM is first started, and
then shuts down the VM. The next time the new VM is started, the boot device is reset, and the VM
starts normally.
To use Operating System Fixup on imported disk images or OVF/OVA packages, enable the feature on
the Advanced Options page of the XenCenter Import wizard. Specify a location where the Fixup ISO
is copied so that XenServer can use it.
The Operating System Fixup option is designed to make the minimal changes possible to enable a
virtual system to boot. Depending on the guest operating system and the hypervisor of the original
host, further actions might be required after using Operating System Fixup. These actions can include
configuration changes and driver installation.
During the Fixup process, an ISO is copied to an ISO SR. The ISO is attached to a VM. The boot order is
set to boot from the virtual DVD drive, and the VM boots into the ISO. The environment within the ISO
then checks each disk of the VM to determine if it is a Linux or a Windows system.
If a Linux system is detected, the location of the GRUB configuration file is determined. Any pointers
to SCSI disk boot devices are modified to point to IDE disks. For example, if GRUB contains an entry
of /dev/sda1 representing the first disk on the first SCSI controller, this entry is changed to /dev/
hda1 representing the first disk on the first IDE controller.
If a Windows system is detected, a generic critical boot device driver is extracted from the driver data‑
base of the installed OS and registered with the OS. This process is especially important for older
Windows operating systems when the boot device is changed between a SCSI and IDE interface.
If certain virtualization tool sets are discovered in the VM, they are disabled to prevent performance
problems and unnecessary event messages.
Import VMs
When you import a VM, you effectively create a VM, using many of the same steps required to provision
a new VM. These steps include nominating a host, and configuring storage and networking.
You can import OVF/OVA, disk image, XVA, and XVA Version 1 files using the XenCenter Import wizard.
You can also import XVA files via the xe CLI.
Note:
It is not guaranteed that you can import a VM that was exported from a more up‑to‑date system
onto a less up‑to‑date system. For example, if you export a VM from a host that is at the latest
level on the Early Access update channel, you might not be able to import this VM into a host that
at the latest level on the Normal update channel straight away. The host on the Normal channel
must reach the same level of updates as the Early Access channel had when the VM was exported
before you can import the VM in to that host.
This behavior is caused by additional metadata that might be added in later updates, which ear‑
lier versions do not understand.
The XenCenter Import wizard allows you to import VMs that have been saved as OVF/OVA files. The
Import wizard takes you through the usual steps to create a VM in XenCenter: nominating a host, and
then configuring storage and networking for the new VM. When importing OVF and OVA files, extra
steps may be required, such as:
• When importing VMs that have been created using other virtualization platforms, run the Op‑
erating System Fixup feature to ensure a basic level of interoperability for the VM. For more
information, see Operating system fixup.
Prerequisites
• Ensure that the target host has enough RAM to support the virtual machines being imported. A
lack of available RAM results in a failed import.
Imported OVF packages appear as vApps when imported using XenCenter. When the import is com‑
plete, the new VMs appear in the XenCenter Resources pane, and the new vApp appears in the Man‑
age vApps dialog box.
• In the Resources pane, right‑click, and then select Import on the shortcut menu.
2. On the first page of the wizard, locate the file you want to import, and then click Next to con‑
tinue.
If the package you are importing includes any EULAs, accept them and click Next to continue.
When no EULAs are included in the package, the wizard skips this step and advances straight to
the next page.
4. Specify the pool or host to which you want to import the VMs.
5. Configure storage for the imported VMs: Choose one or more storage repositories on which to
place the imported virtual disks, and then click Next to continue.
To place all the imported virtual disks on the same SR, select Place all imported VMs on this
target SR. Select an SR from the list.
To place the virtual disks of incoming VMs onto different SRs, select Place imported VMs on the
specified target SRs. For each VM, select the target SR from the list in the SR column.
6. Configure networking for the imported VMs: map the virtual network interfaces in the VMs you
are importing to target networks in the destination pool. The Network and MAC address shown
in the list of incoming VMs are stored as part of the definition of the original (exported) VM in the
export file. To map an incoming virtual network interface to a target network, select a network
from the list in the Target Network column. Click Next to continue.
7. Specify security settings: If the selected OVF/OVA package is configured with security features,
such as certificates or a manifest, specify the information necessary, and then click Next to con‑
tinue.
Different options appear on the Security page depending on which security features have been
configured on the OVF appliance:
• If the appliance is signed, a Verify digital signature check box appears, automatically se‑
lected. Click View Certificate to display the certificate used to sign the package. If the
certificate appears as untrusted, it is likely that either the Root Certificate or the Issuing
Certificate Authority is not trusted on the local computer. Clear the Verify digital signa‑
ture check box if you do not want to verify the signature.
• If the appliance includes a manifest, a Verify manifest content check box appears. Select
this check box to have the wizard verify the list of files in the package.
When packages are digitally signed, the associated manifest is verified automatically, so the
Verify manifest content check box does not appear on the Security page.
Note:
VMware Workstation 7.1.x OVF files fail to import when you choose to verify the manifest.
This failure occurs because VMware Workstation 7.1.x produces an OVF file with a manifest
that has invalid SHA‑1 hashes. If you do not choose to verify the manifest, the import is
successful.
8. Enable Operating System Fixup: If the VMs in the package you are importing were built on a
virtualization platform other than XenServer, select the Use Operating System Fixup check
box. Select an ISO SR where the Fixup ISO can be copied so that XenServer can access it. For
more information about this feature, see Operating system fixup.
9. Review the import settings, and then click Finish to begin the import process and close the
wizard.
Note:
Importing a VM may take some time, depending on the size of the VM and the speed and
bandwidth of the network connection.
The import progress is displayed in the status bar at the bottom of the XenCenter window and on the
Logs tab. When the newly imported VM is available, it appears in the Resources pane, and the new
vApp appears in the Manage vApps dialog box.
Note:
After using XenCenter to import an OVF package that contains Windows operating systems, you
must set the platform parameter.
The XenCenter Import wizard allows you to import a disk image into a pool or specific host as a VM.
The Import wizard takes you through the usual steps to create a VM in XenCenter: nominating a host,
and then configuring storage and networking for the new VM.
Prerequisites
• The Import wizard requires local storage on the server on which you are running it.
• In the Resources pane, right‑click, and then select Import on the shortcut menu.
2. On the first page of the wizard, locate the file you want to import, and then click Next to con‑
tinue.
Enter a name for the new VM to be created from the imported disk image, and then allocate the
number of CPUs and amount of memory. Click Next to continue.
4. Specify the pool or host to which you want to import the VM.
5. Configure storage for the imported VMs: Select one or more storage repositories on which to
place the imported virtual disks, and then click Next to continue.
To place all the imported virtual disks on the same SR, select Place all imported VMs on this
target SR. Select an SR from the list.
To place the virtual disks of incoming VMs onto different SRs, select Place imported VMs on the
specified target SRs. For each VM, select the target SR from the list in the SR column.
6. Configure networking for the imported VMs: map the virtual network interfaces in the VMs you
are importing to target networks in the destination pool. The Network and MAC address shown
in the list of incoming VMs are stored as part of the definition of the original (exported) VM in the
export file. To map an incoming virtual network interface to a target network, select a network
from the list in the Target Network column. Click Next to continue.
On the Boot options page, specify the boot mode for the new VM. Only the options that are
supported with the guest operating system can be selected.
• BIOS Boot: Select this option to boot the VM in legacy BIOS mode. Legacy BIOS boot is
not supported for Windows 11 VMs.
• UEFI Boot: Select this option to boot the VM in UEFI mode. XenServer supports this boot
mode only for certain guest operating systems. For more information about the guest op‑
erating systems that are supported for UEFI boot, see Guest UEFI boot and Secure Boot.
• UEFI Secure Boot: Select this option to boot the VM in UEFI Secure Boot mode. Secure
Boot prevents unsigned, incorrectly signed or modified binaries from being run during
boot. XenServer supports this boot mode only for certain guest operating systems. For
more information about the guest operating systems that are supported for UEFI Secure
Boot, see Guest UEFI boot and Secure Boot.
(VHDX/AVHDX only) When importing a VM from a VHDX/AVHDX file, the Import wizard attempts
to automatically detect the boot mode from the VHDX/AVHDX file you are importing. Review
the settings and ensure that the same boot mode that was originally configured for the VM is
selected.
If the disk image that you are importing is built on a hypervisor other than XenServer, select
Use Operating System Fixup. Choose an ISO SR where the Fixup ISO can be copied so that
XenServer can use it. For more information, see About VM Import and Export.
Important:
If you are importing a VHDX/AVHDX file from Citrix Provisioning (PVS) on VMware vSphere,
select Don’t use Operating System Fixup. Enabling Operating System Fixup for
VHDX/AVHDX from PVS might result in a boot failure.
9. Review the import settings, and then click Finish to begin the import process and close the
wizard.
Importing a VM might take some time, depending on the size of the VM and the speed and band‑
width of the network connection.
The import progress is displayed in the status bar at the bottom of the XenCenter window and on the
Logs tab. When the newly imported VM is available, it appears in the Resources pane.
Note:
After using XenCenter to import a disk image that contains Windows operating systems, you must
set the platform parameter. The value of this parameter varies according to the version of
Windows contained in the disk image:
• For Windows Server 2016 and later, set the platform parameter to device_id=0002. For
example:
• For all other versions of Windows, set the platform parameter to viridian=true. For ex‑
ample:
You can import VMs, templates, and snapshots that have previously been exported and stored locally
in XVA format (.xva). To do so, you follow the usual steps to create a VM: nominating a host, and then
configuring storage and networking for the new VM.
Warning:
It may not always be possible to run an imported VM that was exported from another host with
a different CPU type. For example, a Windows VM exported from a host with an Intel VT Enabled
CPU might not run when imported to a host with an AMD‑VTM CPU.
• In the Resources pane, right‑click, and then select Import on the shortcut menu.
• On the File menu, select Import.
2. On the first page of the wizard, locate the file you want to import (.xva or ova.xml), and then
click Next to continue.
If you enter a URL location (http, https, file, or ftp) in the Filename box. Click Next,
a Download Package dialog box opens and you must specify a folder on your XenCenter host
where the file is copied.
3. Select a pool or host for the imported VM to start on, and then choose Next to continue.
4. Select the storage repositories on which to place the imported virtual disk, and then click Next
to continue.
5. Configure networking for the imported VMs: map the virtual network interface in the VM you are
importing to target a network in the destination pool. The Network and MAC address shown in
the list of incoming VMs are stored as part of the definition of the original (exported) VM in the
export file. To map an incoming virtual network interface to a target network, select a network
from the list in the Target Network column. Click Next to continue.
6. Review the import settings, and then click Finish to begin the import process and close the
wizard.
Note:
Importing a VM may take some time, depending on the size of the VM and the speed and
bandwidth of the network connection.
The import progress is displayed in the status bar at the bottom of the XenCenter window and on the
Logs tab. When the newly imported VM is available, it appears in the Resources pane.
To import the VM to the default SR on the target XenServer host, enter the following:
To import the VM to a different SR on the target XenServer host, add the optional sr-uuid parame‑
ter:
If you want to preserve the MAC address of the original VM, add the optional preserve parameter
and set to true:
Note:
Importing a VM may take some time, depending on the size of the VM and the speed and band‑
width of the network connection.
After the VM has been imported, the command prompt returns the UUID of the newly imported VM.
Export VMs
You can export OVF/OVA and XVA files using the XenCenter Export wizard; you can also export XVA files
via the xe CLI.
Using the XenCenter Export wizard, you can export one or more VMs as an OVF/OVA package. When
you export VMs as an OVF/OVA package, the configuration data is exported along with the virtual hard
disks of each VM.
2. Open the Export wizard: in the Resources pane, right‑click the pool or host containing the VMs
you want to export, and then select Export.
4. From the list of available VMs, select the VMs that you want to include in the OVF/OVA package,
and then click Next to continue.
5. If necessary, you can add to a previously prepared End User Licensing Agreement (EULA) docu‑
ment (.rtf, .txt) to the package.
To add a EULA, click Add and browse to the file you want to add. Once you have added the file,
you can view the document by selecting it from the EULA files list and then clicking View.
EULAs can provide the legal terms and conditions for using the appliance and the applications
delivered in the appliance.
The ability to include one or more EULAs lets you legally protect the software on the appliance.
For example, if your appliance includes a proprietary operating system on its VMs, you might
want to include the EULA text from that operating system. The text is displayed and the person
who imports the appliance must accept it.
Note:
Attempting to add EULA files that are not in supported formats, including XML or binary
files, can cause the import EULA functionality to fail.
6. On the Advanced options page, specify a manifest, signature and output file options, or just
click Next to continue.
a) To create a manifest for the package, select the Create a manifest check box.
The manifest provides an inventory or list of the other files in a package. The manifest
is used to ensure that the files originally included when the package was created are the
same files present when the package arrives. When the files are imported, a checksum is
used to verify that the files have not changed since the package was created.
The digital signature (.cert) contains the signature of the manifest file and the cer‑
tificate used to create that signature. When a signed package is imported, the user
can verify the identity of the package creator by using the public key of the certificate
to validate the digital signature.
Use an X.509 certificate that you have already created from a Trusted Authority and ex‑
ported as a .pfx file. For certificates with SHA‑256 digest export using the “Microsoft
Enhanced RSA and AES Cryptographic Provider”as CSP.
iii. In Private key password enter the export (PFX) password, or, if an export password
was not provided, the private key associated with the certificate.
c) To output the selected VMs as a single (tar) file in OVA format, select the Create OVA pack‑
age (single OVA export file) check box. For more on the different file formats, see Open
virtualization format.
d) To compress virtual hard disk images (.VHD files) included in the package, select the Com‑
press OVF files check box.
When you create an OVF package, the virtual hard disk images are, by default, allocated
the same amount of space as the exported VM. For example, a VM that is allocated 26 GB
of space has a hard disk image that consumes 26 GB of space. The hard disk image uses
this space regardless of whether or not the VM actually requires it.
Note:
Compressing the VHD files makes the export process take longer to complete. Im‑
porting a package containing compressed VHD files also takes longer, as the Import
wizard must extract all of the VHD images as it imports them.
If both Create OVA package (single OVA export file) and Compress OVF files are checked, the
result is a compressed OVA file with the extension .ova.gz.
To have the wizard verify the exported package, select the Verify export on completion check
box. Click Finish to begin the export process and close the wizard.
Note:
Exporting a VM may take some time, depending on the size of the VM and the speed and
bandwidth of the network connection.
The export progress is displayed in the status bar at the bottom of the XenCenter window and on the
Logs tab. To cancel an export in progress, click the Logs tab, find the export in the list of events, and
click the Cancel button.
Export VMs as XVA You can export an existing VM as an XVA file using the XenCenter Export wizard
or the xe CLI. We recommend exporting a VM to a machine other than the XenServer host, on which
you can maintain a library of export files. For example, you can export the VM to the machine running
XenCenter.
Warning:
It may not always be possible to run an imported VM that was exported from another host with
a different CPU type. For example, a Windows VM exported from a host with an Intel VT Enabled
CPU might not run when imported to a host with an AMD‑VTM CPU.
2. Open the Export wizard: from the Resources pane, right‑click the VM which you want to export,
and then select Export.
4. From the list of available VMs, select the VM that you want to export, and then click Next to
continue.
To have the wizard verify the exported package, select the Verify export on completion check
box. Click Finish to begin the export process and close the wizard.
Note:
Exporting a VM may take some time, depending on the size of the VM and the speed and
bandwidth of the network connection.
The export progress is displayed in the status bar at the bottom of the XenCenter window and on the
Logs tab. To cancel an export in progress, click the Logs tab, find the export in the list of events, and
click the Cancel button.
Note:
Be sure to include the .xva extension when specifying the export file name. If the ex‑
ported VM doesn’t have this extension, XenCenter might fail to recognize the file as a valid
XVA file when you attempt to import it.
Delete VMs
Deleting a virtual machine (VM) removes its configuration and its filesystem from the host. When you
delete a VM, you can choose to delete or preserve any virtual disks attached to the VM, in addition to
any snapshots of the VM.
To delete a VM:
1 xe vm-list
1 xe vm-shutdown uuid=<uuid>
1 xe vm-disk-list vm=<uuid>
1 xe vdi-destroy uuid=<uuid>
Important:
4. (Optional) You can choose to delete the snapshots associated with the VM:
1 xe snapshot-list snapshot-of=<uuid>
b) For each snapshot to delete, find the UUIDs of the virtual disks for that snapshot:
1 xe snapshot-disk-list snapshot-uuid=<uuid>
1 xe vdi-destroy uuid=<uuid>
1 xe snapshot-destroy uuid=<uuid>
1 xe vm-destroy uuid=<uuid>
To delete a VM:
2. Select the stopped VM in the Resources panel, right‑click, and select Delete on the shortcut
menu. Alternatively, on the VM menu, select Delete.
5. Click Delete.
When the delete operation is completed, the VM is removed from the Resources pane.
Note:
VM snapshots whose parent VM has been deleted (orphan snapshots) can still be accessed from
the Resources pane. These snapshots can be exported, deleted, or used to create VMs and tem‑
plates. To view snapshots in the Resources pane, select Objects in the Navigation pane and then
expand the Snapshots group in the Resources pane.
vApps
vApps can be created and changed using both XenCenter and the xe CLI. For information on work‑
ing with vApps using the CLI, see Command Line Interface.
The Manage vApps dialog box enables you to create, delete, change, start, and shut down vApps, and
import and export vApps within the selected pool. If you select a vApp in the list, the VMs it contains
are listed in the details pane on the right.
You can use Manage vApps to do the following actions:
To change vApps:
1. Select the pool and, on the Pool menu, select Manage vApps.
Alternatively, right‑click in the Resources pane and select Manage vApps on the shortcut menu.
2. Select the vApp and choose Properties to open its Properties dialog box.
3. Select the General tab to change the vApp name or description.
4. Select the Virtual Machines tab to add or remove VMs from the vApp.
5. Select the VM Startup Sequence tab to change the start order and delay interval values for
individual VMs in the vApp.
6. Click OK to save your changes and close Properties.
Create vApps
1. Choose the pool and, on the Pool menu, select Manage vApps.
2. Type a name for the vApp, and optionally a description. Click Next.
You can choose any name you like, but a name that describes the vApp is best. Although it is
advisable to avoid creating multiple vApps that have the same name, it is not a requirement.
XenCenter does not force vApp names to be unique. It is not necessary to use quotation marks
for names that include spaces.
3. Choose which VMs to include in the new vApp. Click Next.
You can use the search field to list only VMs that have names that include the specified text
string.
4. Specify the startup sequence for the VMs in the vApp. Click Next.
Value Description
1. On the final page of Manage vApps, you can review the vApp configuration. Click Previous to
go back and change any settings or Finish to create the vApp and close Manage vApps.
Note:
A vApp can span across multiple hosts in a single pool, but cannot span across several
pools.
Delete vApps
1. Choose the pool and, on the Pool menu, select Manage vApps.
2. Select the vApp you want to delete from the list. Click Delete.
Note:
To start or shut down a vApp, use Manage vApps, accessed from the Pool menu. When you start a
vApp, all the VMs within it are started up automatically in sequence. The start order and delay interval
values specified for each individual VM control the startup sequence. These values can be set when
you first create the vApp. Change these values at any time from the vApp Properties dialog box or
individual VM Properties dialog box.
To start a vApp:
1. Open Manage vApps: Choose the pool where the VMs in the vApp are located and, on the Pool
menu, select Manage vApps. Alternatively, right‑click in the Resources pane and select Man‑
age vApps on the shortcut menu.
2. Choose the vApp and click Start to start all the VMs it contains.
1. Open Manage vApps: Choose the pool where the VMs in the vApp are located and, on the Pool
menu, select Manage vApps. Alternatively, right‑click in the Resources pane and select Man‑
age vApps on the shortcut menu.
2. Choose the vApp and click Shut Down to shut down all the VMs in the vApp.
A soft shutdown is attempted on all VMs. If a soft shutdown is not possible, then a forced shut‑
down is performed.
Note:
A soft shutdown performs a graceful shutdown of the VM, and all running processes are halted
individually.
A forced shutdown performs a hard shutdown and is the equivalent of unplugging a physical
server. It might not always shut down all running processes. If you shut down a VM in this way,
you risk losing data. Only use a forced shutdown when a soft shutdown is not possible.
vApps can be imported and exported as OVF/OVA packages. For more information, see Import and
Export VMs.
To export a vApp:
2. Choose the vApp you want to export in the list. Click Export.
To import a vApp:
After the import is complete, the new vApp appears in the list of vApps in Manage vApps.
VM memory
When you create a VM, a fixed amount of memory is allocated to the VM. You can use Dynamic Memory
Control (DMC) to improve the utilization of physical memory in your XenServer environment. DMC is
a memory management feature that enables dynamic reallocation of memory between VMs.
XenCenter provides a graphical display of memory usage in its Memory tab. For more information,
see the XenCenter documentation.
• You can add or delete memory without restarting the VMs, providing a seamless experience to
the user.
• When hosts are full, DMC allows you to start more VMs on these hosts, reducing the amount of
memory allocated to the running VMs proportionally.
XenServer DMC works by automatically adjusting the memory of running VMs, keeping the amount
of memory allocated to each VM between specified minimum and maximum memory values, guaran‑
teeing performance, and permitting greater density of VMs per host.
Without DMC, when a host is full, starting additional VMs fail with “out of memory”errors. To reduce
the existing VM memory allocation and make room for more VMs, edit each VM’s memory allocation
and then restart the VM. When using DMC, XenServer attempts to reclaim memory by automatically re‑
ducing the current memory allocation of running VMs within their defined memory ranges. XenServer
attempts to reclaim memory even when the host is full.
Notes:
Dynamic Memory Control is not supported with VMs that have a virtual GPU.
For each VM, the administrator can set a dynamic memory range. The dynamic memory range is the
range within which memory can be added/removed from the VM without requiring a restart. When a
VM is running, the administrator can adjust the dynamic range. XenServer always guarantees to keep
the amount of memory allocated to the VM within the dynamic range. Therefore adjusting it while
the VM is running may cause XenServer to adjust the amount of memory allocated to the VM. The
most extreme case is where the administrator sets the dynamic min/max to the same value, forcing
XenServer to ensure that this amount of memory is allocated to the VM. If new VMs are required to
start on “full”hosts, running VMs have their memory ‘squeezed’to start new ones. The required extra
memory is obtained by squeezing the existing running VMs proportionally within their pre‑defined
dynamic ranges
DMC allows you to configure dynamic minimum and maximum memory levels –creating a Dynamic
Memory Range (DMR) that the VM operates in.
• Dynamic Minimum Memory: A lower memory limit that you assign to the VM.
• Dynamic Higher Limit: An upper memory limit that you assign to the VM.
For example, if the Dynamic Minimum Memory was set at 512 MB and the Dynamic Maximum Memory
was set at 1,024 MB, it gives the VM a Dynamic Memory Range (DMR) of 512–1024 MB, within which
it operates. XenServer guarantees always to assign each VM memory within its specified DMR when
using DMC.
Many operating systems that XenServer supports do not fully ‘understand’the notion of dynamically
adding or deleting memory. As a result, XenServer must declare the maximum amount of memory
that a VM is asked to consume at the time that it restarts. Declaring the maximum amount of memory
allows the guest operating system to size its page tables and other memory management structures
accordingly. This introduces the concept of a static memory range within XenServer. The static mem‑
ory range cannot be adjusted when the VM is running. For a particular boot, the dynamic range is
constrained such as to be always contained within this static range. The static minimum (the lower
bound of the static range) protects the administrator and is set to the lowest amount of memory that
the OS can run with XenServer.
Note:
We recommend that you do not change the static minimum level as the static minimum level
is set at the supported level per operating system. See the memory constraints table for more
details.
Setting a static maximum level higher than a dynamic max allows you to allocate more memory
to a VM in future without restarting the VM.
DMC behavior
Automatic VM squeezing
• If DMC is not enabled, when hosts are full, new VM starts fail with ‘out of memory’errors.
• When DMC is enabled, even when hosts are full, XenServer attempts to reclaim memory by re‑
ducing the memory allocation of running VMs within their defined dynamic ranges. In this way,
running VMs are squeezed proportionally at the same distance between the dynamic minimum
and dynamic maximum for all VMs on the host
• When the host’s memory is plentiful ‑ All running VMs receive their Dynamic Maximum Memory
level
• When the host’s memory is scarce ‑ All running VMs receive their Dynamic Minimum Memory
level.
When you are configuring DMC, remember that allocating only a small amount of memory to a VM can
negatively impact it. For example, allocating too little memory:
• Using Dynamic Memory Control to reduce the amount of physical memory available to a VM can
cause it to restart slowly. Likewise, if you allocate too little memory to a VM, it can start slowly.
• Setting the dynamic memory minimum for a VM too low can result in poor performance or sta‑
bility problems when the VM is starting.
Using DMC, it is possible to operate a guest virtual machine in one of two modes:
1. Target Mode: The administrator specifies a memory target for the guest. XenServer adjusts
the guest’s memory allocation to meet the target. Specifying a target is useful in virtual server
environments, and in situations where you know exactly how much memory you want a guest
to use. XenServer adjusts the guest’s memory allocation to meet the target you specify.
2. Dynamic Range Mode: The administrator specifies a dynamic memory range for the guest.
XenServer selects a target from the range and adjusts the guest’s memory allocation to meet
the target. Specifying a dynamic range is useful in any situation where you want XenServer to
repartition host memory dynamically in response to changing numbers of guests, or changing
host memory pressure. XenServer selects a target from within the range and adjusts the guest’
s memory allocation to meet the target.
Note:
It is possible to change between target mode and dynamic range mode at any time for any run‑
ning guest. Specify a new target, or a new dynamic range, and XenServer takes care of the rest.
Memory constraints
XenServer allows administrators to use all memory control operations with any guest operating
system. However, XenServer enforces the following memory property ordering constraint for all
guests:
XenServer allows administrators to change guest memory properties to any values that satisfy this
constraint, subject to validation checks. However, in addition to the previous constraint, we support
only certain guest memory configurations for each supported operating system. The range of sup‑
ported configurations depends on the guest operating system in use. XenServer does not prevent ad‑
ministrators from configuring guests to exceed the supported limit. However, customers are advised
to keep memory properties within the supported limits to avoid performance or stability problems.
For detailed guidelines on the minimum and maximum memory limits for each supported operating
system, see Guest operating system support.
Warning:
When configuring guest memory, we advise NOT to exceed the maximum amount of physical
memory addressable by your operating system. Setting a memory maximum that is greater than
the operating system supported limit can lead to stability problems within your guest.
The dynamic minimum must be at least 75% of the static maximum for all supported operating
systems. A lower limit can lead to stability problems. Administrators are encouraged to calibrate
the sizes of their VMs carefully, and ensure that their working set of applications function reliably
at dynamic‑minimum.
xe CLI commands
1 xe vm-list
For example, the following displays the static maximum memory properties for the VM with the
UUID beginning ec77:
1 xe vm-param-get uuid= \
2 ec77a893-bff2-aa5c-7ef2-9c3acf0f83c0 \
3 param-name=memory-static-max;
4 268435456
The example shows that the static maximum memory for this VM is 268,435,456 bytes (256 MB).
To display the dynamic memory properties, follow the procedure as above but use the command
param-name=memory-dynamic:
1 xe vm-list
For example, the following displays the dynamic maximum memory properties for the VM with
UUID beginning ec77
1 xe vm-param-get uuid= \
2 ec77a893-bff2-aa5c-7ef2-9c3acf0f83c0 \
3 param-name=memory-dynamic-max;
4 134217728
The example shows that the dynamic maximum memory for this VM is 134,217,728 bytes (128
MB).
Warning:
Use the correct ordering when setting the static/dynamic minimum/maximum parameters. In
addition, you must not invalidate the following constraint:
1 xe vm-memory-dynamic-range-set \
2 uuid=uuid min=value \
3 max=value
Specifying a target is useful in virtual server environments, and in any situation where you know ex‑
actly how much memory you want a guest to use. XenServer adjusts the guest’s memory allocation
to meet the target you specify. For example:
1 xe vm-memory-limits-set \
2 uuid=uuid \
3 static-min=value \
4 dynamic-min=value \
5 dynamic-max=value static-max=value
Notes:
• To allocate a specific amount memory to a VM that doesn’t change, set the Dynamic Maxi‑
mum and Dynamic Minimum to the same value.
• You cannot increase the dynamic memory of a VM beyond the static maximum.
• To alter the static maximum of a VM, you must shut down the VM.
Warning:
Do not change the static minimum level as it is set at the supported level per operating system.
For more information, see Memory constraints.
1 xe vm-list
2. Note the uuid, and then use the command memory-dynamic-{ min,max } =value
VM boot behavior
There are two options for the behavior of a Virtual Machine’s VDI when the VM is booted:
Note:
The VM must be shut down before you can change its boot behavior setting.
Persist
Tip:
Use this boot behavior if you are hosting Citrix Virtual Desktops that are static or dedicated ma‑
chines.
This behavior is the default on VM boot. The VDI is left in the state it was at the last shutdown.
Select this option if you plan to allow users to make permanent changes to their desktops. To select
persist, shut down the VM, and then enter the following command:
Reset
Tip:
Use this boot behavior if you are hosting Citrix Virtual Desktops that are shared or randomly al‑
located machines.
On VM boot, the VDI is reverted to the state it was in at the previous boot. Any changes made while
the VM is running are lost when the VM is next booted.
Select this option if you plan to deliver standardized desktops that users cannot permanently change.
To select reset, shut down the VM, and then enter the following command:
Warning:
After you change on-boot=reset, any data saved to the VDI is discarded after the next shut‑
down/start or reboot.
To make an ISO library available to XenServer hosts, create an external NFS or SMB/CIFS share direc‑
tory. The NFS or SMB/CIFS server must allow root access to the share. For NFS shares, allow access by
setting the no_root_squash flag when you create the share entry in /etc/exports on the NFS
server.
Then either use XenCenter to attach the ISO library, or connect to the host console and run the com‑
mand:
1 xe-mount-iso-sr host:/volume
For advanced use, you can pass extra arguments to the mount command.
To make a Windows SMB/CIFS share available to the host, either use XenCenter, or connect to the host
console and run the following command:
Replace back slashes in the unc_path argument with forward‑slashes. For example:
After mounting the share, any available ISOs are available from the Install from ISO Library or DVD
drive list in XenCenter. These ISOs are also available as CD images from the CLI commands.
You can use one of the following ways of viewing a Windows VM console, both of which support full
use of the keyboard and mouse.
• Using XenCenter. This method provides a standard graphical console and uses the VNC technol‑
ogy built in to XenServer to provide remote access to your virtual machine console.
• Connecting using Windows Remote Desktop. This method uses the Remote Desktop Protocol
technology
In XenCenter on the Console tab, there is a Switch to Remote Desktop button. This button disables
the standard graphical console within XenCenter, and switches to using Remote Desktop.
If you do not have Remote Desktop enabled in the VM, this button is disabled. To enable it, install the
XenServer VM Tools for Windows. Follow the procedure below to enable it in each VM that you want
to connect using Remote Desktop.
1. Open System by clicking the Start button, right‑click on Computer, and then select Properties.
2. Click Remote settings. If you’re prompted for an administrator password, type the password
you created during the VM setup.
3. In the Remote Desktop area, click the check box labeled Allow connections from computers
running any version of Remote Desktop.
4. To select any non‑administrator users that can connect to this Windows VM, click the Select
Remote Users button and provide the user names. Users with Administrator privileges on the
Windows domain can connect by default.
You can now connect to this VM using Remote Desktop. For more information, see the Microsoft Knowl‑
edge Base article, Connect to another computer using Remote Desktop Connection.
Note:
You cannot connect to a VM that is asleep or hibernating. Set the settings for sleep and hiberna‑
tion on the remote computer to Never.
For Windows guests, initially the control domain clock drives the time. The time updates during VM
lifecycle operations such as suspend and reboot.We recommend running a reliable NTP service in the
control domain and all Windows VMs.
If you manually set a VM to be two hours ahead of the control domain, then it persists. You might set
the VM ahead by using a time‑zone offset within the VM. If you later change the control domain time
(either manually or by NTP), the VM shifts accordingly but maintains the two hours offset. Changing
the control domain time‑zone does not affect VM time‑zones or offset. XenServer uses the hardware
clock setting of the VM to synchronize the VM. XenServer does not use the system clock setting of the
VM.
When performing suspend and resume operations or using live migration, ensure that you have up‑
to‑date XenServer VM Tools for Windows installed. XenServer VM Tools for Windows notify the Win‑
dows kernel that a time synchronization is required after resuming (potentially on a different physical
host).
Note:
If you are running Windows VMs in Citrix Virtual Desktops environment, you must ensure that the
host clock has the same source as the Active Directory (AD) domain. Failure to synchronize the
clocks can cause the VMs to display an incorrect time and cause the Windows PV drivers to crash.
In addition to the behavior defined by XenServer, operating system settings and behaviors can af‑
fect the time handling behavior of your Linux VMs. Some Linux operating systems might periodically
synchronize their system clock and hardware clock, or the operating system might use its own NTP
service by default. For more information, see the documentation for the operating system of your
Linux VM.
Note:
When installing a new Linux VM, ensure that you change the time‑zone from the default UTC to
your local value. For specific distribution instructions, see Linux Release Notes.
Hardware clocks in Linux VMs are not synchronized to the clock running on the control domain and
can be altered. When the VM first starts, the control domain time is used to set the initial time of the
hardware clock and system clock.
If you change the time on the hardware clock, this change is persisted when the VM reboots.
System clock behavior depends on the operating system of the VM. For more information, see the
documentation for your VM operating system.
There are two types of VM: BIOS‑generic and BIOS‑customized. To enable installation of Reseller Op‑
tion Kit (BIOS‑locked) OEM versions of Windows onto a VM, copy the BIOS strings of the VM from the
host with which the media was supplied. Alternatively, advanced users can set user‑defined values to
the BIOS strings.
BIOS‑generic
Note:
If a VM doesn’t have BIOS strings set when it starts, the standard XenServer BIOS strings are in‑
serted into it and the VM becomes BIOS‑generic.
BIOS‑customized
You can customize the BIOS in two ways: Copy‑Host BIOS strings and User‑Defined BIOS strings.
Note:
After you first start a VM, you cannot change its BIOS strings. Ensure that the BIOS strings are
correct before starting the VM for the first time.
Copy‑Host BIOS strings The VM has a copy of the BIOS strings of a particular host in the pool. To
install the BIOS‑locked media that came with your host, follow the procedures given below.
Using XenCenter:
1. Click the Copy host BIOS strings to VM check box in the New VM Wizard.
For example:
1 xe vm-install copy-bios-strings-from=46dd2d13-5aee-40b8-ae2c-95786
ef4 \
2 template="win7sp1" sr-name-label=Local\ storage \
3 new-name-label=newcentos
4 7cd98710-bf56-2045-48b7-e4ae219799db
2. If the relevant BIOS strings from the host have been successfully copied into the VM, the com‑
mand vm-is-bios-customized confirms this success:
For example:
1 xe vm-is-bios-customized uuid=7cd98710-bf56-2045-48b7-e4ae219799db
2 This VM is BIOS-customized.
Note:
When you start the VM, it is started on the physical host from which you copied the BIOS
strings.
Warning:
It is your responsibility to comply with any EULAs governing the use of any BIOS‑locked operating
systems that you install.
User‑defined BIOS strings The user has option to set custom values in selected BIOS strings using
CLI/API. To install the media in a VM with customized BIOS, follow the procedure given below.
2. To set user‑defined BIOS strings, run the following command before starting the VM for the first
time:
For example:
1 xe vm-param-set uuid=7cd98710-bf56-2045-48b7-e4ae219799db \
2 bios-strings:bios-vendor="vendor name" \
3 bios-strings:bios-version=2.4 \
4 bios-strings:system-manufacturer="manufacturer name" \
5 bios-strings:system-product-name=guest1 \
6 bios-strings:system-version=1.0 \
7 bios-strings:system-serial-number="serial number" \
8 bios-strings:enclosure-asset-tag=abk58hr
Notes:
• Once the user‑defined BIOS strings are set in a single CLI/API call, they cannot be mod‑
ified.
• You can decide on the number of parameters you want to provide to set the user‑
defined BIOS strings.
Warning:
• Comply with any EULAs and standards for the values being set in VM’s BIOS.
• Ensure that the values you provide for the parameters are working parameters. Providing
XenServer enables you to assign a physical GPU in the XenServer host to a Windows VM running on
the same host. This GPU pass‑through feature benefits graphics power users, such as CAD designers,
who require high performance graphics capabilities. It is supported only for use with Citrix Virtual
Desktops.
While XenServer supports only one GPU for each VM, it automatically detects and groups identical
physical GPUs across hosts in the same pool. Once assigned to a group of GPUs, a VM may be started
on any host in the pool that has an available GPU in the group. When attached to a GPU, a VM has
certain features that are no longer available, including live migration, VM snapshots with memory,
and suspend/resume.
Assigning a GPU to a VM in a pool does not interfere with the operation of other VMs in the pool. How‑
ever, VMs with GPUs attached are considered non‑agile. If VMs with GPUs attached are members of
a pool with high availability enabled, both features overlook these VMs. The VMs cannot be migrated
automatically.
Requirements
GPU pass‑through is supported for specific machines and GPUs. In all cases, the IOMMU chipset fea‑
ture (known as VT‑d for Intel models) must be available and enabled on the XenServer host. Before
enabling the GPU pass‑through feature, visit the Hardware Compatibility List.
Before you assign a GPU to a VM, put the appropriate physical GPUs in your XenServer host and then
restart the machine. Upon restart, XenServer automatically detects any physical GPUs. To view all
physical GPUs across hosts in the pool, use the xe pgpu-list command.
Ensure that the IOMMU chipset feature is enabled on the host. To do so, enter the following:
If the value printed is false, IOMMU is not enabled, and GPU pass‑through is not available using the
specified XenServer host.
3. Assign a GPU to the VM: Select GPU from the list of VM properties, and then select a GPU type.
Click OK.
1. Shut down the VM that you want to assign a GPU group by using the xe vm-shutdown com‑
mand.
1 xe gpu-group-list
This command prints all GPU groups in the pool. Note the UUID of the appropriate GPU group.
To ensure that the GPU group has been attached, run the xe vgpu-list command.
5. Once the VM starts, install the graphics card drivers on the VM.
Installing the drivers is essential, as the VM has direct access to the hardware on the host. Drivers
are provided by your hardware vendor.
Note:
If you try to start a VM with GPU pass‑through on the host without an available GPU in the appro‑
priate GPU group, XenServer prints an error.
3. Detach the GPU from the VM: Select GPU from the list of VM properties, and then select None
as the GPU type. Click OK.
2. Find the UUID of the vGPU attached to the VM by entering the following:
1 xe vgpu-list vm-uuid=uuid_of_vm
1 xe vgpu-destroy uuid=uuid_of_vgpu
XenServer can use ISO images as installation media and data sources for Windows or Linux VMs. This
section describes how to make ISO images from CD/DVD media.
1. Put the CD‑ or DVD‑ROM disk into the drive. Ensure that the disk is not mounted. To check, run
the command:
1 mount
If the disk is mounted, unmount the disk. See your operating system documentation for assis‑
tance if necessary.
1 dd if=/dev/cdrom of=/path/cdimg_filename.iso
This command takes some time. When the operation is completed successfully, you see some‑
thing like:
1 1187972+0 records in
2 1187972+0 records out
Windows computers do not have an equivalent operating system command to create an ISO. Most
CD‑burning tools have a means of saving a CD as an ISO file.
VMs might not be set up to support Virtual Network Computing (VNC), which XenServer uses to control
VMs remotely, by default. Before you can connect with XenCenter, ensure that the VNC server and an
X display manager are installed on the VM and properly configured. This section describes how to con‑
figure VNC on each of the supported Linux operating system distributions to allow proper interactions
with XenCenter.
For CentOS‑based VMs, use the instructions for the Red Hat‑based VMs below, as they use the same
base code to provide graphical VNC access. CentOS X is based on Red Hat Enterprise Linux X.
Note:
Before enabling a graphical console on your Debian VM, ensure that you have installed the
XenServer VM Tools for Linux. For more information, see Install the XenServer VM Tools for
Linux.
The graphical console for Debian virtual machines is provided by a VNC server running inside the VM.
In the recommended configuration, a standard display manager controls the console so that a login
dialog box is provided.
1. Install your Debian guest with the desktop system packages, or install GDM (the display man‑
ager) using apt (following standard procedures).
Note:
The Debian Graphical Desktop Environment, which uses the Gnome Display Manager ver‑
sion 3 daemon, can take significant CPU time. Uninstall the Gnome Display Manager gdm3
package and install the gdm package as follows:
3. Set up a VNC password (not having one is a serious security risk) by using the vncpasswd com‑
mand. Pass in a file name to write the password information to. For example:
1 vncpasswd /etc/vncpass
4. Modify your gdm.conf file (/etc/gdm/gdm.conf) to configure a VNC server to manage dis‑
play 0 by extending the [servers] and [daemon] sections as follows:
1 [servers]
2 0=VNC
3 [daemon]
4 VTAllocation=false
5 [server-VNC]
6 name=VNC
7 command=/usr/bin/Xvnc -geometry 800x600 -PasswordFile /etc/
vncpass BlacklistTimeout=0
8 flexible=true
5. Restart GDM, and then wait for XenCenter to detect the graphical console:
1 /etc/init.d/gdm restart
Note:
You can check that the VNC server is running using a command like ps ax | grep vnc.
Note:
Before setting up your Red Hat VMs for VNC, be sure that you have installed the XenServer VM
Tools for Linux. For more information, see Install the XenServer VM Tools for Linux.
To configure VNC on Red Hat VMs, modify the GDM configuration. The GDM configuration is held in a
file whose location varies depending on the version of Red Hat Linux you are using. Before modifying
it, first determine the location of this configuration file. This file is modified in several subsequent
procedures in this section.
If you are using Red Hat Linux, the GDM configuration file is /etc/gdm/custom.conf. This file is a
split configuration file that contains only user‑specified values that override the default configuration.
This type of file is used by default in newer versions of GDM. It is included in these versions of Red Hat
Linux.
1. As root on the text CLI in the VM, run the command rpm -q vnc-server gdm. The package
names vnc-server and gdm appear, with their version numbers specified.
The package names that are displayed show the packages that are already installed. If you see
a message that says that a package is not installed, you might have not selected the graphical
desktop options during installation. Install these packages before you can continue. For details
regarding installing more software on your VM, see the appropriate Red Hat Linux x86 Installa‑
tion Guide.
2. Open the GDM configuration file with your preferred text editor and add the following lines to
the file:
1 [server-VNC]
2 name=VNC Server
3 command=/usr/bin/Xvnc -SecurityTypes None -geometry 1024x768 -
depth 16 \
4 -BlacklistTimeout 0
5 flexible=true
With configuration files on Red Hat Linux, add these lines into the empty [servers] section.
3. Modify the configuration so that the Xvnc server is used instead of the standard X server:
• 0=Standard
Modify it to read:
0=VNC
• If you are using Red Hat Linux, add the above line just below the [servers] section and
before the [server-VNC] section.
Restart GDM for your change in configuration to take effect, by running the command /usr/sbin/
gdm-restart.
Note:
Red Hat Linux uses runlevel 5 for graphical startup. If your installation starts up in runlevel 3,
change this configuration for the display manager to be started and get access to a graphical
console. For more information, see Check Run levels.
Firewall settings
The firewall configuration by default does not allow VNC traffic to go through. If you have a firewall
between the VM and XenCenter, allow traffic over the port that the VNC connection uses. By default, a
VNC server listens for connections from a VNC viewer on TCP port 5900 + n, where n is the display
number (usually zero). So a VNC server setup for Display‑0 listens on TCP port 5900, Display‑1 is TCP
-5901, and so on. Consult your firewall documentation to ensure that these ports are open. For more
information, see Communication Ports Used by XenServer.
If you want to use IP connection tracking or limit the initiation of connections to be from one side only,
further configure your firewall.
Alternatively, you can disable the firewall until the next reboot by running the command service
iptables stop, or permanently by running chkconfig iptables off. This configuration
can expose extra services to the outside world and reduce the overall security of your VM.
After connecting to a VM with the graphical console, the screen resolution sometimes doesn’t match.
For example, the VM display is too large to fit comfortably in the Graphical Console pane. Control this
behavior by setting the VNC server geometry parameter as follows:
1. Open the GDM configuration file with your preferred text editor. For more information, see De‑
termine the Location of your VNC Configuration File.
The value of the geometry parameter can be any valid screen width and height.
If you are using Red Hat Linux, the GDM configuration file is /etc/gdm/custom.conf. This file is a
split configuration file that contains only user‑specified values that override the default configuration.
By default, this type of file is used in newer versions of GDM and is included in these versions of Red
Hat Linux.
During the operating system installation, select Desktop mode. On the RHEL installation screen, se‑
lect Desktop > Customize now and then click Next:
This action displays the Base System screen, ensure that Legacy UNIX compatibility is selected:
Work through the following steps to continue the setup of your RHEL VMs:
1. Open the GDM configuration file with your preferred text editor and add the following lines to
the appropriate sections:
1 [security]
2 DisallowTCP=false
3
4 [xdmcp]
5 Enable=true
1 service vnc-server
2 {
3
4 id = vnc-server
5 disable = no
6 type = UNLISTED
7 port = 5900
8 socket_type = stream
9 wait = no
10 user = nobody
11 group = tty
12 server = /usr/bin/Xvnc
13 server_args = -inetd -once -query localhost -
SecurityTypes None \
14 -geometry 800x600 -depth 16
15 }
4. Open the file /etc/sysconfig/iptables. Add the following line above the line reading,
-A INPUT -j REJECT --reject-with icmp-host-prohibited:
1 # telinit 3
2 # telinit 5
Note:
Red Hat Linux uses runlevel 5 for graphical startup. If your installation starts up in runlevel 3,
change this configuration for the display manager be started and to get access to a graphical
console. For more information, see Check run levels.
Before setting up your SUSE Linux Enterprise Server VMs for VNC, be sure that you have installed
the XenServer VM Tools for Linux. See Install the XenServer VM Tools for Linux for details.
SLES has support for enabling “Remote Administration”as a configuration option in YaST. You can
select to enable Remote Administration at install time, available on the Network Services screen of
the SLES installer. This feature allows you to connect an external VNC viewer to your guest to allow you
to view the graphical console. The method for using the SLES remote administration feature is slightly
different than the method provided by XenCenter. However, it is possible to modify the configuration
files in your SUSE Linux VM such that it is integrated with the graphical console feature.
Before making configuration changes, verify that you have a VNC server installed. SUSE ships the
tightvnc server by default. This server is a suitable VNC server, but you can also use the standard
RealVNC distribution.
You can check that you have the tightvnc software installed by running the command:
1 rpm -q tightvnc
If Remote Administration was not enabled during installation of the SLES software, you can enable it
as follows:
1 yast
2. Use the arrow keys to select Network Services in the left menu. Tab to the right menu and use
the arrow keys to select Remote Administration. Press Enter.
3. In the Remote Administration screen, Tab to the Remote Administration Settings section.
Use the arrow keys to select Allow Remote Administration and press Enter to place an X in the
check box.
4. Tab to the Firewall Settings section. Use the arrow keys to select Open Port in Firewall and
press Enter to place an X in the check box.
6. A message box is displayed, telling you to restart the display manager for your settings to take
effect. Press Enter to acknowledge the message.
7. The original top‑level menu of YaST appears. Tab to the Quit button and press Enter.
After enabling Remote Administration, modify a configuration file if you want to allow XenCenter to
connect. Alternatively, use a third party VNC client.
1 service vnc1
2 {
3
4 socket_type = stream
5 protocol = tcp
6 wait = no
7 user = nobody
8 server = /usr/X11R6/bin/Xvnc
9 server_args = :42 -inetd -once -query localhost -geometry 1024
x768 -depth 16
10 type = UNLISTED
11 port = 5901
12 }
1 port = 5900
5. Restart the display manager and xinetd service with the following commands:
1 /etc/init.d/xinetd restart
2 rcxdm restart
SUSE Linux uses runlevel 5 for graphical startup. If your remote desktop does not appear, verify that
your VM is configured to start up in runlevel 5. For more information, see Check Run levels.
Firewall settings
By default the firewall configuration does not allow VNC traffic to go through. If you have a firewall
between the VM and XenCenter, allow traffic over the port that the VNC connection uses. By default, a
VNC server listens for connections from a VNC viewer on TCP port 5900 + n, where n is the display
number (usually zero). So a VNC server setup for Display‑0 listens on TCP port 5900, Display‑1 is TCP
-5901, and so forth. Consult your firewall documentation to ensure that these ports are open. For
more information, see Communication Ports Used by XenServer.
If you want to use IP connection tracking or limit the initiation of connections to be from one side only,
further configure your firewall.
1 yast
2. Use the arrow keys to select Security and Users in the left menu. Tab to the right menu and
use the arrow keys to select Firewall. Press Enter.
3. In the Firewall screen, use the arrow keys to select Custom Rules in the left menu and then
press Enter.
4. Tab to the Add button in the Custom Allowed Rules section and then press Enter.
5. In the Source Network field, enter 0/0. Tab to the Destination Port field and enter 5900.
8. In the Summary screen Tab to the Finish button and press Enter.
9. On the top‑level YaST screen Tab to the Quit button and press Enter.
10. Restart the display manager and xinetd service with the following commands:
1 /etc/init.d/xinetd restart
2 rcxdm restart
Alternatively, you can disable the firewall until the next reboot by running the rcSuSEfirewall2 stop
command, or permanently by using YaST. This configuration can expose extra services to the outside
world and reduce the overall security of your VM.
After connecting to a Virtual Machine with the Graphical Console, the screen resolution sometimes
does not match. For example, the VM display is too large to fit comfortably in the Graphical Console
pane. Control this behavior by setting the VNC server geometry parameter as follows:
1. Open the /etc/xinetd.d/vnc file with your preferred text editor and find the service_vnc1
section (corresponding to displayID 1).
2. Edit the geometry argument in the server-args line to the desired display resolution. For
example,
The value of the geometry parameter can be any valid screen width and height.
1 /etc/init.d/xinetd restart
2 rcxdm restart
Red Hat and SUSE Linux VMs use runlevel 5 for graphical startup. This section describes how to verify
that your VM starts up in runlevel 5 and how to change this setting.
1. Check /etc/inittab to see what the default runlevel is set to. Look for the line that reads:
1 id:n:initdefault:
2. You can run the command telinit q ; telinit 5 after this change to avoid having to
reboot to switch run levels.
Troubleshoot VM problems
If you see unusual VM behavior, this section aims to help you solve the problem. This section de‑
scribes where application logs are located and other information that can help your XenServer Solu‑
tion Provider track and resolve the issue.
Important:
Follow the troubleshooting information in this section only under the guidance of your XenServer
Solution Provider or the Support Team.
Vendor Updates: Keep your VMs up‑to‑date with operating system vendor‑supplied updates. The
vendor might have provided fixes for VM crashed and other failures.
VM crashes
If you are experiencing VM crashes, it is possible that a kernel crash dump can help identify the prob‑
lem. Reproduce the crash, if possible, and follow this procedure. Consult your guest OS vendor for
further investigation on this issue.
The crashdump behavior of your VMs can be controlled by using the actions-after-crash pa‑
rameter. The following are the possible values:
Value Description
Value Description
1. On the XenServer host, determine the UUID of the desired VM by running the following com‑
mand:
By default Windows crash dumps are put into %SystemRoot%\Minidump in the Windows VM it‑
self. You can configure the VMs dump level by following the menu path My Computer > Properties >
Advanced > Startup and Recovery.
The XenServer VM Tools for Windows include a diagnostic tool called xtbugtool. This tool is avail‑
able as a PowerShell script, xtbugtool.ps1.
In addition, we provide a deprecated batch script version for running on older versions of Windows,
xtbugtool.bat. Where possible, we recommend that you use the PowerShell version.
• Windows 10
• Windows 11
• Windows Server 2016
• Windows Server 2019
• Windows Server 2022
To help diagnose any issues with XenServer VM Tools for Windows, the script gathers the following
information from your Windows VM:
– C:\ProgramData\Citrix
– C:\ProgramData\Citrix Systems, Inc.
– C:\ProgramData\XenServer
– C:\Windows\Inf\setupapi.dev.log
– C:\Windows\Inf\setupapi.setup.log
– systeminfo
– tasklist /NH
– pnputil ‑e
– pnputil /enum‑drivers
– winmgmt /verifyrepository
– ipconfig /all
If you do not provide a value for the output path, the script outputs to the current directory.
The script creates a compressed file with a name in the format xtbugtool-yyyyMMddHHmmss.
zip in the output directory that you specify.
The script creates a compressed file with a name in the format xt-bugtool-YYYY.MM.DD-xxxx
.zip in the output directory that you specify.
How do I change the screen resolution of the XenCenter console on a UEFI‑enabled VM?
Check that your VM operating system supports UEFI Secure Boot mode. The following operating sys‑
tems support Secure Boot:
• Windows 10 (64‑bit)
• Windows 11 (64‑bit)
• Windows Server 2016 (64‑bit)
• Windows Server 2019 (64‑bit)
• Windows Server 2022 (64‑bit)
If you see the following messages on the console of your UEFI Secure Boot VM and an alert in XenCen‑
ter, the Secure Boot process has failed and your VM does not start.
This is usually caused by the installation of unsigned drivers into the VM. Investigate what drivers have
been updated or installed since the last successful Secure Boot.
You can disable Secure Boot and start the VM in setup mode to remove the unsigned drivers.
Important:
To change a UEFI Secure Boot VM into a UEFI boot VM, run the following command on the XenServer
host that hosts the VM:
After you have fixed your VM, run the following command to re‑enable Secure Boot:
To diagnose whether an issue on your VM is caused by Secure Boot being enabled for the VM, disable
Secure Boot and try to reproduce the issue.
To disable Secure Boot, run the following command on the XenServer host that hosts the VM:
After you have debugged the issue, you can run the following command to re‑enable Secure Boot:
You cannot run Windows debug on a Secure Boot Windows VM. To run Windows debug on your VM,
you can do one of the following things:
After you have debugged the issue, you can run the following command to re‑enable Secure
Boot:
Why are only two NICs showing up for my UEFI‑enabled Windows VM?
Even if you set up more than two NICs when you created your UEFI‑enabled VM, when the VM first
starts you only see two NICs. After the XenServer VM Tools for Windows have been installed in the VM,
this information displays correctly.
Why are my emulated devices showing as different types than expected on a UEFI Windows
VM?
UEFI Secure Boot VMs use NVME and E1000 for emulated devices. However, when the VM first starts
the emulated devices show as different types. After the XenServer VM Tools for Windows have been
Why can’t I convert my templates from BIOS mode to UEFI or UEFI Secure Boot mode?
You can only create a UEFI‑enabled VM template from a template supplied with XenServer.
Do not use the xe template-param-set command for templates that have something installed
on them or templates that you created from a snapshot. The boot mode of these snapshots cannot
be changed and, if you attempt to change the boot mode, the VM fails to boot.
On the XenServer host where the UEFI or UEFI Secure Boot VM is hosted, run the following com‑
mands:
1 varstore-ls
This command lists the GUIDs and names of the available variables. Use the GUID and name in the
following command:
If you are also working with a third party to debug and fix issues in their UEFI Secure Boot VM, the
third party provide might provide unsigned drivers for test or verification purpose. These drivers do
not work in a UEFI Secure Boot VM.
Request a signed driver from the third party. Or you can switch your UEFI Secure Boot VM into setup
mode to run with the unsigned driver.
Xentop utility
The xentop utility displays real‑time information about a XenServer system and running domains in a
semi‑graphical format. You can use this tool to investigate the state of the domain associated with a
VM.
1. Connect to the XenServer host over SSH or, in XenCenter, go to the Console tab of the host.
Output columns
• NAME ‑ The name of the domain. “Domain‑0”is the XenServer control domain. Other domains
belong to the VMs.
• STATE ‑ The state of the domain. The state can have one of the following values:
Xentop parameters
You can use the following parameters to configure the output for the xentop command:
You can also configure most of these parameters from within the xentop utility.
High availability
August 5, 2024
High availability is a set of automatic features designed to plan for, and safely recover from issues
which take down XenServer hosts or make them unreachable. For example, during physically dis‑
rupted networking or host hardware failures.
Overview
High availability ensures that if a host becomes unreachable or unstable, the VMs running on that host
are safely restarted on another host automatically. This removes the need for the VMs to be manually
restarted, resulting in minimal VM downtime.
When the pool coordinator becomes unreachable or unstable, high availability can also recover ad‑
ministrative control of a pool. High availability ensures that administrative control is restored auto‑
matically without any manual intervention.
Optionally, high availability can also automate the process of restarting VMs on hosts which are known
to be in a good state without manual intervention. These VMs can be scheduled for restart in groups
to allow time to start services. It allows infrastructure VMs to be started before their dependent VMs
(for example, a DHCP server before its dependent SQL server).
Warnings:
Use high availability along with multipathed storage and bonded networking. Configure multi‑
pathed storage and bonded networking before attempting to set up high availability. Customers
who do not set up multipathed storage and bonded networking can see unexpected host reboot
behavior (Self‑Fencing) when there is an infrastructure instability.
All graphics solutions (NVIDIA vGPU and vGPU pass‑through) can be used in an environment that
uses high availability. However, VMs that use these graphics solutions cannot be protected with
high availability. These VMs can be restarted on a best‑effort basis while there are hosts with the
appropriate free resources.
Overcommitting
A pool is overcommitted when the VMs that are currently running cannot be restarted elsewhere fol‑
lowing a user‑defined number of host failures. Overcommitting can happen if there is not enough free
memory across the pool to run those VMs following a failure. However, there are also more subtle
changes which can make high availability unsustainable: changes to Virtual Block Devices (VBDs) and
networks can affect which VMs can be restarted on which hosts. XenServer cannot check all potential
actions and determine if they cause violation of high availability demands. However, an asynchro‑
nous notification is sent if high availability becomes unsustainable.
XenServer dynamically maintains a failover plan which details what to do when a set of hosts in a pool
fail at any given time. An important concept to understand is the host failures to tolerate
value, which is defined as part of the high availability configuration. The value of host failures
to tolerate determines the number of host failures that are allowed while still being able to
restart all protected VMs. For example, consider a resource pool that consists of 64 hosts and host
failures to tolerate is set to 3. In this case, the pool calculates a failover plan that allows
any three hosts to fail and then restarts the VMs on other hosts. If a plan cannot be found, then the
pool is considered to be overcommitted. The plan is dynamically recalculated based on VM lifecycle
operations and movement. If changes (for example, the addition of new VMs to the pool) cause the
pool to become overcommitted, alerts are sent either via XenCenter or email.
Overcommitment warning
If any attempts to start or resume a VM would cause the pool to become overcommitted, a warning
alert is displayed in XenCenter. You can then choose to cancel the operation or proceed anyway. Pro‑
ceeding causes the pool to become overcommitted and a message is sent to any configured email
addresses. This is also available as a message instance through the management API. The amount of
memory used by VMs of different priorities is displayed at the pool and host levels.
Host fencing
Sometimes a host can fail due to the loss of network connectivity or when a problem with the control
stack is encountered. In such cases, the XenServer host self‑fences to ensure that the VMs are not
running on two hosts simultaneously. When a fence action is taken, the host restarts immediately
and abruptly, causing all VMs running on it to be stopped. The other hosts detect that the VMs are no
longer running and then the VMs are restarted according to the restart priorities assigned to them. The
fenced host enters a reboot sequence, and when it has restarted it tries to rejoin the resource pool.
Note:
Hosts in clustered pools can also self‑fence when they cannot communicate with more than half
of the other hosts in the resource pool. For more information, see Clustered pools.
Configuration requirements
• XenServer pool (this feature provides high availability at the host level within a single resource
pool).
Note:
We recommend that you enable high availability only in pools that contain at least 3
XenServer hosts. For more information, see CTX129721 ‑ High Availability Behavior When
the Heartbeat is Lost in a Pool.
• Shared storage, including at least one iSCSI, NFS, or Fibre Channel LUN of size 356 MB or greater
‑ the heartbeat SR. The high availability mechanism creates two volumes on the heartbeat SR:
Note:
Storage attached using either SMB or iSCSI when authenticated using CHAP cannot be used
as the heartbeat SR.
If the IP address of a host changes while high availability is enabled, high availability as‑
sumes that the host’s network has failed. The change in IP address can fence the host
and leave it in an unbootable state. To remedy this situation, disable high availability us‑
ing the host-emergency-ha-disable command, reset the pool coordinator using
pool-emergency-reset-master, and then re‑enable high availability.
• For maximum reliability, we recommend that you use a dedicated bonded interface as the high
availability management network.
For a VM to be protected by high availability, it must be agile. This means the VM:
• Must have its virtual disks on shared storage. You can use any type of shared storage. iSCSI, NFS,
or Fibre Channel LUN is only required for the storage heartbeat and can be used for virtual disk
storage.
Note:
When high availability is enabled, we strongly recommend using a bonded management inter‑
face on the hosts in the pool and multipathed storage for the heartbeat SR.
If you create VLANs and bonded interfaces from the CLI, then they might not be plugged in and active
despite being created. In this situation, a VM can appear to be not agile and it is not protected by high
availability. You can use the CLI pif-plug command to bring up the VLAN and bond PIFs so that
the VM can become agile. You can also determine precisely why a VM is not agile by using the xe
diagnostic-vm-status CLI command. This command analyzes its placement constraints, and
you can take remedial action if necessary.
Virtual machines can be considered protected, best‑effort, or unprotected by high availability. The
value of ha-restart-priority defines whether a VM is treated as protected, best‑effort, or un‑
protected. The restart behavior for VMs in each of these categories is different.
Protected
High availability guarantees to restart a protected VM that goes offline or whose host goes offline,
provided the pool isn’t overcommitted and the VM is agile.
If a protected VM cannot be restarted when a host fails, high availability attempts to start the VM when
there is extra capacity in a pool. Attempts to start the VM when there is extra capacity might now
succeed.
Best‑effort
If the host of a best‑effort VM goes offline, high availability attempts to restart the best‑effort VM on
another host. It makes this attempt only after all protected VMs have been successfully restarted. High
availability makes only one attempt to restart a best‑effort VM. If this attempt fails, high availability
does not make further attempts to restart the VM.
Unprotected
If an unprotected VM or the host it runs on is stopped, high availability does not attempt to restart the
VM.
Note:
High availability never stops or migrates a running VM to free resources for a protected or best‑
effort VM to be restarted.
If the pool experiences host failures and the number of tolerable failures drops to zero, the protected
VMs are not guaranteed to restart. In such cases, a system alert is generated. If another failure occurs,
all VMs that have a restart priority set behave according to the best‑effort behavior.
Start order
The start order is the order in which XenServer high availability attempts to restart protected VMs when
a failure occurs. The values of the order property for each of the protected VMs determines the start
order.
The order property of a VM is used by high availability and also by other features that start and shut
down VMs. Any VM can have the order property set, not just the VMs marked as protected for high
availability. However, high availability uses the order property for protected VMs only.
The value of the order property is an integer. The default value is 0, which is the highest priority.
Protected VMs with an order value of 0 are restarted first by high availability. The higher the value of
the order property, the later in the sequence the VM is restarted.
You can set the value of the order property of a VM by using the command‑line interface:
Or in XenCenter, in the Start Options panel for a VM, set Start order to the required value.
You can enable high availability on a pool by using either XenCenter or the command‑line interface
(CLI). In either case, you specify a set of priorities that determine which VMs are given the highest
restart priority when a pool is overcommitted.
Warnings:
• When you enable high availability, some operations that compromise the plan for restarting
VMs (such as removing a host from a pool) might be disabled. You can temporarily disable
high availability to perform such operations, or alternatively, make VMs protected by high
availability unprotected.
• If high availability is enabled, you cannot enable clustering on your pool. Temporarily dis‑
able high availability to enable clustering. You can then enable high availability on your
clustered pool. Some high availability behavior, such as self‑fencing, is different for clus‑
tered pools. For more information, see Clustered pools.
1. Verify that you have a compatible Storage Repository (SR) attached to your pool. iSCSI, NFS,
or Fibre Channel SRs are compatible. For information about how to configure such a storage
repository using the CLI, see Manage storage repositories.
2. For each VM you want to protect, set a restart priority and start order. You can set the restart
priority as follows:
Alternatively, you can set a default timeout for your pool. For more information about how to
set a timeout, see Configure high availability timeout.
1 xe pool-ha-compute-max-host-failures-to-tolerate
The number of failures to tolerate determines when an alert is sent. The system recomputes
a failover plan as the state of the pool changes. It uses this computation to identify the pool
capacity and how many more failures are possible without loss of the liveness guarantee for
protected VMs. A system alert is generated when this computed value falls below the specified
value for ha-host-failures-to-tolerate.
The timeout is the period during which networking or storage is not accessible by the hosts in your
pool. If any XenServer host is unable to access networking or storage within the timeout period, it
can self‑fence and restart. The default timeout is 60 seconds. However, you can change this value by
using the following command.
If you enable high availability by using XenCenter instead of the xe CLI, this default still applies.
Alternatively, you can set timeout when you enable high availability:
Note that if you set timeout when enabling high availability, it only applies to that specific enablement.
Therefore, if you disable and then reenable high availability later, the high availability feature reverts
to using the default timeout.
To disable high availability features for a VM, use the xe vm-param-set command to set the ha
-restart-priority parameter to be an empty string. Setting the ha-restart-priority
parameter does not clear the start order settings. You can enable high availability for a VM again by
setting the ha-restart-priority parameter to restart or best-effort as appropriate.
If for some reason, a host cannot access the high availability state file, it is possible that a host might
become unreachable. To recover your XenServer installation, you might have to disable high avail‑
ability using the host-emergency-ha-disable command:
1 xe host-emergency-ha-disable --force
If the host was the pool coordinator, it starts up as normal with high availability disabled. Pool mem‑
bers reconnect and automatically disable high availability. If the host was a pool member and cannot
contact the pool coordinator, you might have to take one of the following actions:
• Tell the host where the new pool coordinator is (xe pool-emergency-reset-master):
Take special care when shutting down or rebooting a host to prevent the high availability mechanism
from assuming that the host has failed. To shut down a host cleanly when high availability is enabled,
disable the host, evacuate the host, and finally shutdown the host by using either XenCenter or the CLI.
To shut down a host in an environment where high availability is enabled, run these commands:
When a VM is protected under a high availability plan and set to restart automatically, it cannot be shut
down while this protection is active. To shut down a VM, first disable its high availability protection and
then run the CLI command. XenCenter offers you a dialog box to automate disabling the protection
when you select the Shutdown button of a protected VM.
Note:
If you shut down a VM from within the guest, and the VM is protected, it is automatically restarted
under the high availability failure conditions. The automatic restart helps ensure that operator
error doesn’t result in a protected VM being left shut down accidentally. If you want to shut down
this VM, disable its high availability protection first.
The XenServer Disaster Recovery (DR) feature allows you to recover virtual machines (VMs) and vApps
from a failure of hardware which destroys a whole pool or site. For protection against single host
failures, see High availability.
Note:
You must be logged on with your root account or have the role of Pool Operator or higher to use
the DR feature.
Understanding XenServer DR
XenServer DR works by storing all the information required to recover your business‑critical VMs and
vApps on storage repositories (SRs). The SRs are then replicated from your primary (production) en‑
vironment to a backup environment. When a protected pool at your primary site goes down, you can
recover the VMs and vApps in that pool from the replicated storage recreated on a secondary (DR) site
with minimal application or user downtime.
The Disaster Recovery settings in XenCenter can be used to query the storage and import selected
VMs and vApps to a recovery pool during a disaster. When the VMs are running in the recovery pool, the
recovery pool metadata is also replicated. The replication of the pool metadata allows any changes
in VM settings to be populated back to the primary pool when the primary pool recovers. Sometimes,
information for the same VM can be in several places. For example, storage from the primary site, stor‑
age from the disaster recovery site and also in the pool that the data is to be imported to. If XenCenter
finds that the VM information is present in two or more places, it ensures that it uses only the most
recent information.
The Disaster Recovery feature can be used with XenCenter and the xe CLI. For CLI commands, see
Disaster recovery commands.
Tip:
You can also use the Disaster Recovery settings to run test failovers for non‑disruptive testing of
your disaster recovery system. In a test failover, all the steps are the same as failover. However,
the VMs and vApps are not started up after they have been recovered to the disaster recovery site.
When the test is complete, cleanup is performed to delete all VMs, vApps, and storage recreated
on the DR site.
• Virtual disks that are being used by the VM, stored on configured storage repositories (SRs) in
the pool where the VMs are located.
• Metadata describing the VM environment. This information is required to recreate the VM if the
original VM is unavailable or corrupted. Most metadata configuration data is written when the
VM is created and is updated only when you change the VM configuration. For VMs in a pool, a
copy of this metadata is stored on every host in the pool.
In a DR environment, VMs are recreated on a secondary site using the pool metadata and configura‑
tion information about all VMs and vApps in the pool. The metadata for each VM includes its name,
description and Universal Unique Identifier (UUID), and its memory, virtual CPU, and networking and
storage configuration. It also includes VM startup options –start order, delay interval, high availabil‑
ity, and restart priority. The VM startup options are used when restarting the VM in a high availability
or DR environment. For example, when recovering VMs during disaster recovery, VMs within a vApp
are restarted in the DR pool in the order specified in the VM metadata, and using the specified delay
intervals.
DR infrastructure requirements
Set up the appropriate DR infrastructure at both the primary and secondary sites to use XenServer
DR.
• Storage used for pool metadata and the virtual disks used by the VMs must be replicated from
the primary (production) environment to a backup environment. Storage replication such as us‑
ing mirroring varies between devices. Therefore, consult your storage solution vendor to handle
Storage replication.
• After the VMs and vApps that you recovered to a pool on your DR site are up and running, the SRs
containing the DR pool metadata and virtual disks must be replicated. Replication allows the
recovered VMs and vApps to be restored back to the primary site (failed back) when the primary
site is back online.
• The hardware infrastructure at your DR site does not have to match the primary site. However,
the XenServer environment must be at the same release and patch level.
• The hosts and pools at the secondary site must have the same license edition as those at the
primary site. These XenServer licenses are in addition to those assigned to hosts at the primary
site.
• Sufficient resources must be configured in the target pool to allow all the failed over VMs to be
recreated and started.
Warning:
The Disaster Recovery settings do not control any Storage Array functionality.
Users of the Disaster Recovery feature must ensure that the metadata storage is, in some way
replicated between the two sites. Some Storage Arrays contain “Mirroring”features to achieve
the replication automatically. If you use these features, you must disable the mirror functionality
(“mirror is broken”) before restarting VMs on the recovery site.
Deployment considerations
• Note how your VMs and vApps are mapped to SRs, and the SRs to LUNs. Take particular care
with the naming of the name_label and name_description parameters. Recovering VMs
and vApps from replicated storage is easier if the names of SRs capture how VMs and vApps are
mapped to SRs, and SRs to LUNs.
• Ensure that the SRs you are replicating the primary pool metadata to are attached to only one
pool.
The following section describes the steps to take after a disaster has occurred.
• Break any existing storage mirrors so that the recovery site has read/write access to the shared
storage.
• Ensure that the LUNs you want to recover VM data from are not attached to any other pool, or
corruption can occur.
• If you want to protect the recovery site from a disaster, you must enable pool metadata replica‑
tion to one or more SRs on the recovery site.
The following section describes the steps to take after a successful recovery of data.
• On the recovery site, cleanly shut down the VMs or vApps that you want to move back to the
primary site.
• On the primary site, follow the same procedure as for the failover in the previous section, to
failback selected VMs or vApps to the primary
• To protect the primary site against future disaster ‑ you must re‑enable pool metadata replica‑
tion to one or more SRs on the replicated LUNs.
This section describes how to enable Disaster Recovery in XenCenter. Use the Configure DR option
to identify storage repositories where the pool metadata, configuration information about all the VMs
and vApps in the pool is stored. The metadata is updated whenever you change the VM or vApp con‑
figuration within the pool.
Note:
You can enable Disaster Recovery only when using LVM over HBA or LVM over iSCSI. A small
amount of space is required on this storage for a new LUN which contains the pool recovery in‑
formation.
Before you begin, ensure that the SRs used for DR are attached only to the pool at the primary site.
SRs used for DR must not be attached to the pool at the secondary site.
1. On the primary site, select the pool that you want to protect. From the Pool menu, point to
Disaster Recovery, and then select Configure.
2. Select up to 8 SRs where the pool metadata can be stored. A small amount of space is required
on this storage for a new LUN which contains the pool recovery information.
Note:
Information for all VMs in the pool is stored, VMs do not need to be independently selected
for protection.
This section explains how to recover your VMs and vApps on the secondary (recovery) site.
1. In XenCenter select the secondary pool, and on the Pool menu, select Disaster Recovery and
then Disaster Recovery Wizard.
The Disaster Recovery wizard displays three recovery options: Failover, Failback, and Test
Failover. To recover on to your secondary site, select Failover and then select Next.
Warning:
If you use Fibre Channel shared storage with LUN mirroring to replicate data to the sec‑
ondary site, break the mirroring before attempting to recover VMs. Mirroring must be bro‑
ken to ensure that the secondary site has Read/Write access.
2. Select the storage repositories (SRs) containing the pool metadata for the VMs and vApps that
you want to recover.
By default, the list on this wizard page shows all SRs that are currently attached within the pool.
To scan for more SRs, select Find Storage Repositories and then select the storage type to scan
for:
• To scan for all the available Hardware HBA SRs, select Find Hardware HBA SRs.
• To scan for software iSCSI SRs, select Find Software iSCSI SRs and then type the target
host, IQN, and LUN details.
When you have selected the required SRs in the wizard, select Next to continue.
3. Select the VMs and vApps that you want to recover. Select the appropriate Power state after
recovery option to specify whether you want the wizard to start them up automatically when
they have been recovered. Alternatively, you can start them up manually after failover is com‑
plete.
Select Next to progress to the next wizard page and begin failover prechecks.
4. The wizard performs several prechecks before starting failover. For example, to ensure that all
the storage required by the selected VMs and vApps is available. If any storage is missing at this
point, you can select Attach SR on this page to find and attach the relevant SR.
Resolve any issues on the prechecks page, and then select Failover to begin the recovery
process.
5. A progress page displays the result of the recovery process for each VM and vApp. The Failover
process exports the metadata for VMs and vApps from the replicated storage. Therefore, the
time taken for Failover depends on the VMs and vApps you recover. The VMs and vApps are
recreated in the primary pool, and the SRs containing the virtual disks are attached to the recre‑
ated VMs. If specified, the VMs are started.
6. When the failover is complete, select Next to see the summary report. Select Finish on the
summary report page to close the wizard.
When the primary site is available, work through the Disaster Recovery wizard and select Failback to
return to running your VMs on that site.
Restore VMs and vApps to the primary site after disaster (Failback)
This section explains how to restore VMs and vApps from replicated storage. You can restore VMs and
vApps back to a pool on your primary (production) site when the primary site comes back up after a
disaster. To failback VMs and vApps to your primary site, use the Disaster Recovery wizard.
1. In XenCenter select the primary pool, and on the Pool menu, select Disaster Recovery and then
Disaster Recovery Wizard.
The Disaster Recovery wizard displays three recovery options: Failover, Failback, and Test
Failover. To restore VMs and vApps to your primary site, select Failback and then select Next.
Warning:
When you use Fibre Channel shared storage with LUN mirroring to replicate data to the pri‑
mary site, break the mirroring before attempting to restore VMs. Mirroring must be broken
to ensure that the primary site has Read/Write access.
2. Select the storage repositories (SRs) containing the pool metadata for the VMs and vApps that
you want to recover.
By default, the list on this wizard page shows all SRs that are currently attached within the pool.
To scan for more SRs, choose Find Storage Repositories and then select the storage type to
scan for:
• To scan for all the available Hardware HBA SRs, select Find Hardware HBA SRs.
• To scan for software iSCSI SRs, select Find Software iSCSI SRs and then type the target
host, IQN, and LUN details.
When you have selected the required SRs in the wizard, select Next to continue.
3. Select the VMs and vApps that you want to restore. Select the appropriate Power state after re‑
covery option to specify whether you want the wizard to start them up automatically when they
have been recovered. Alternatively, you can start them up manually after failback is complete.
Select Next to progress to the next wizard page and begin failback prechecks.
4. The wizard performs several pre‑checks before starting failback. For example, to ensure that all
the storage required by the selected VMs and vApps is available. If any storage is missing at this
point, you can select Attach SR on this page to find and attach the relevant SR.
Resolve any issues on the prechecks page, and then select Failback to begin the recovery
process.
5. A progress page displays the result of the recovery process for each VM and vApp. The Failback
process exports the metadata for VMs and vApps from the replicated storage. Therefore, Fail‑
back can take some time depending on the number of VMs and vApps you are restoring. The
VMs and vApps are recreated in the primary pool, and the SRs containing the virtual disks are
attached to the recreated VMs. If specified, the VMs are started.
6. When the failback is complete, select Next to see the summary report. Select Finish on the
summary report page to close the wizard.
Test failover
Failover testing is an essential component in disaster recovery planning. You can use the Disaster
Recovery wizard to perform non‑disruptive testing of your disaster recovery system. During a test
failover operation, the steps are the same as for failover. However, instead of being started after they
have been recovered to the DR site, the VMs and vApps are placed in a paused state. At the end of a
test failover operation, all VMs, vApps, and storage recreated on the DR site are automatically deleted.
After initial DR configuration, and after you make significant configuration changes in a DR‑enabled
pool, verify that failover works correctly by performing a test failover.
1. In XenCenter select the secondary pool, and on the Pool menu, select Disaster Recovery to
open the Disaster Recovery Wizard.
The Disaster Recovery wizard displays three recovery options: Failover, Failback, and Test
Failover. To test your disaster recovery system, select Test Failover and then select Next.
Note:
If you use Fibre Channel shared storage with LUN mirroring to replicate data to the sec‑
ondary site, break the mirroring before attempting to recover data. Mirroring must be bro‑
ken to ensure that the secondary site has Read/Write access.
2. Select the storage repositories (SRs) containing the pool metadata for the VMs and vApps that
you want to recover.
By default, the list on this wizard page shows all SRs that are currently attached within the pool.
To scan for more SRs, select Find Storage Repositories and then the storage type to scan for:
• To scan for all the available Hardware HBA SRs, select Find Hardware HBA SRs.
• To scan for software iSCSI SRs, select Find Software iSCSI SRs and then type the target
host, IQN, and LUN details in the box.
When you have selected the required SRs in the wizard, select Next to continue.
3. Select the VMs and vApps that you want to recover then select Next to progress to the next page
and begin failover prechecks.
4. Before beginning the test failover, the wizard performs several pre‑checks. For example, to en‑
sure that all the storage required by the selected VMs and vApps is available.
• Check that storage is available. If any storage is missing, you can select Attach SR on this
page to find and attach the relevant SR.
• Check that high availability is not enabled on the target DR pool. High availability must
be disabled on the secondary pool to avoid having the same VMs running on both the pri‑
mary and DR pools. High availability must be disabled to ensure that it does not start the
recovered VMs and vApps automatically after recovery. To disable high availability on the
secondary pool, you can simply select Disable HA on the page. If high availability is dis‑
abled at this point, it is enabled again automatically at the end of the test failover process.
Resolve any issues on the pre‑checks page, and then select Failover to begin the test failover.
5. A progress page displays the result of the recovery process for each VM and vApp. The Failover
process recovers metadata for the VMs and vApps from the replicated storage. Therefore,
Failover can take some time depending on the number of VMs and vApps you are recovering.
The VMs and vApps are recreated in the DR pool, the SRs containing the virtual disks are
attached to the recreated VMs.
The recovered VMs are placed in a paused state: they do not start up on the secondary site during
a test failover.
6. After you are satisfied that the test failover was performed successfully, select Next in the wizard
to have the wizard clean up on the DR site:
• VMs and vApps that were recovered during the test failover are deleted.
• If high availability on the DR pool was disabled at the prechecks stage to allow the test
failover to take place, it is re‑enabled automatically.
vApps
A vApp is logical group of one or more related Virtual Machines (VMs). vApps can be started up as a
single entity when there is a disaster. When a vApp is started, the VMs contained within the vApp start
in a user predefined order. The start order allows VMs which depend upon one another to be automat‑
ically sequenced. An administrator no longer has to manually sequence the startup of dependent VMs
when a whole service requires restarting. For example, during a software update. The VMs within the
vApp do not have to reside on one host and are distributed within a pool using the normal rules. The
vApp feature is useful in the Disaster Recovery (DR) situation. In a DR scenario, an Administrator may
group all VMs on the same Storage Repository, or which relate to the same Service Level Agreement
(SLA).
1. Select the pool and, on the Pool menu, click Manage vApps.
2. Type a name for the vApp, and optionally a description, and then click Next.
You can choose any name you like, but an informative name is best. Although we recommend
you to avoid having multiple vApps using the same name, it is not a requirement. XenCenter
does not enforce any constraints regarding unique vApp names. It is not necessary to use quo‑
tation marks for names that include spaces.
3. Select which VMs to include in the new vApp, and then click Next.
You can use the search option to list only VMs with names that include the specified text string.
4. Specify the startup sequence for the VMs in the vApp, and then click Next.
Start Order: Specifies the order in which individual VMs are started within the vApp, allowing
certain VMs to be restarted before others. VMs with a start order value of 0 (zero) are started first.
VMs with a start order value of 1 are started next, and then the VMs with a value of 2, and so on.
Attempt to start next VM after: A delay interval that specifies how long to wait after starting
the VM before attempting to start the next group of VMs in the startup sequence.
5. You can review the vApp configuration on the final page. Click Previous to go back and change
any settings, or Finish to create the vApp.
Note:
A vApp can span multiple hosts in a single pool, but cannot span across several pools.
The Manage vApps setting in XenCenter allows you to create, delete, and change vApps. It also en‑
ables you to start and shut down vApps, and import and export vApps within the selected pool. When
you select a vApp in the list, the VMs it contains are listed in the details pane. For more information,
see vApps in the XenCenter documentation.
Whenever possible, leave the installed state of XenServer hosts unaltered. That is, do not install any
additional packages or start additional services on XenServer hosts and treat them as appliances. The
best way to restore, then, is to reinstall XenServer host software from the installation media. If you
have multiple XenServer hosts, the best approach is to configure a TFTP server and appropriate an‑
swer files for this purpose. For more information, see Network boot installations.
We recommend that you use a backup solution offered by one of our certified partners. For more
information, see Citrix Ready Marketplace.
XenServer Premium Edition customers can take advantage of the faster changed block only backup.
For more information, see the changed block tracking documentation.
These solutions are certified by their vendors and not by Cloud Software Group. Support for these
backup solutions is provided by the solution vendor.
We recommend that you frequently perform as many of the following backup procedures as possible
to recover from possible server and software failure.
1 xe pool-dump-database file-name=backup
This command checks that the target machine has an appropriate number of appropriately
named NICs, which is required for the backup to succeed.
Notes:
To back up a VM:
Note:
This backup also backs up all of the VM data. When importing a VM, you can specify the storage
mechanism to use for the backed‑up data.
Warning:
The backup process can take longer to complete as it backs up all of the VM data.
XenServer hosts use a database on each host to store metadata about VMs and associated resources
such as storage and networking. When combined with SRs, this database forms the complete view of
all VMs available across the pool. Therefore it is important to understand how to back up this database
to recover from physical hardware failure and other disaster scenarios.
This section first describes how to back up metadata for single‑host installations, and then for more
complex pool setups.
Use the CLI to back up the pool database. To obtain a consistent pool metadata backup file, run pool
-dump-database on the XenServer host and archive the resulting file. The backup file contains
sensitive authentication information about the pool, so ensure it is securely stored.
To restore the pool database, use the xe pool-restore-database command from a previous
dump file. If your XenServer host has died completely, then you must first do a fresh install, and then
run the pool-restore-database command against the freshly installed XenServer host.
After you restore the pool database, some VMs may still be registered as being Suspended. However,
if the storage repository with the suspended memory state defined in the suspend-VDI-uuid field,
is a local SR, then the SR may not be available as the host has been reinstalled. To reset these VMs back
to the Halted state so that they can start up again, use the xe vm-shutdown vm=vm_name -
force command, or use the xe vm-reset-powerstate vm=vm_name -force command.
Warning:
XenServer preserves UUIDs of the hosts restored using this method. If you restore to a differ‑
ent physical machine while the original XenServer host is still running, duplicate UUIDs may be
present. As a result, XenCenter refuses to connect to the second XenServer host. Pool database
backup is not the recommended mechanism for cloning physical hosts. Use the automated in‑
stallation support instead. For more information, see Install.
In a pool scenario, the pool coordinator provides an authoritative database that is synchronously mir‑
rored to all the pool member hosts. This process provides a level of built‑in redundancy to a pool. Any
pool member can replace the pool coordinator because each pool member has an accurate version
of the pool database. For more information on how to transition a member into becoming a pool
coordinator, see Hosts and resource pools.
This level of protection may not be sufficient. For example, when shared storage containing the VM
data is backed up in multiple sites, but the local server storage (containing the pool metadata) is not.
To re‑create a pool given a set of shared storage, you must first back up the pool-dump-database
file on the pool coordinator host, and archive this file. To restore this backup later on a brand new set
of hosts:
1. Install a fresh set of XenServer hosts from the installation media, or if applicable, network boot
from your TFTP server.
2. Use the xe pool-restore-database on the host designated to be the new pool coordina‑
tor.
3. Run the xe host-forget command on the new pool coordinator to remove the old member
machines.
4. Use the xe pool-join command on the member hosts to connect them to the new pool.
This section describes the XenServer host control domain backup and restore procedures. These pro‑
cedures do not back up the storage repositories that house the VMs, but only the privileged control
domain that runs Xen and the XenServer agent.
Note:
The privileged control domain is best left as installed, without customizing it with other pack‑
ages. We recommend that you set up a network boot environment to install XenServer cleanly
from the XenServer media as a recovery strategy. Typically, you do not need to back up the con‑
trol domain, but we recommend that you save the pool metadata (see Back up virtual machine
metadata). Consider this backup method as complementary to backing up the pool metadata.
Using the xe commands host-backup and host-restore is another approach that you can take.
The xe host-backup command archives the active partition to a file you specify. The xe host-
restore command extracts an archive created by xe host-backup over the currently inactive disk
partition of the host. This partition can then be made active by booting off the installation CD and
selecting to restore the appropriate backup.
After completing the steps in the previous section and rebooting the host, ensure that the VM metadata
is restored to a consistent state. Run xe pool-restore-database on /var/backup/pool
-database-${ DATE } to restore the VM metadata. This file is created by xe host-backup
using xe pool-dump-database command before archiving the running filesystem, to snapshot
a consistent state of the VM metadata.
On a remote host with enough disk space, run the following command
This command creates a compressed image of the control domain file system. The image is stored in
the location specified by the file-name argument.
1. If you want to restore your XenServer host from a specific backup, run the following command
while the XenServer host is up and reachable:
This command restores the compressed image back to the hard disk of the XenServer host which
runs this command (not the host on which filename resides). In this context, “restore”may be
a misnomer, as the word usually suggests that the backed‑up state has been put fully in place.
The restore command only unpacks the compressed backup file and restores it to its normal
form. However, it is written to another partition (/dev/sda2) and does not overwrite the cur‑
rent version of the filesystem.
2. To use the restored version of the root filesystem, reboot the XenServer host using the XenServer
installation CD and select the Restore from backup option.
After the restore from backup is completed, reboot the XenServer host and it will start up from
the restored image.
1 xe pool-restore-database file-name=/var/backup/pool-database-* -h
hostname -u root -pw password
Note:
Restoring from a backup as described in this section does not destroy the backup partition.
If your XenServer host has crashed and is not reachable, use the XenServer installation CD to do an
upgrade install. When the upgrade install is complete, reboot the machine and ensure that your host
is reachable with XenCenter or remote CLI.
Back up VMs
We recommend that you use a backup solution offered by one of our certified partners. For more
information, see Citrix Ready Marketplace.
These solutions are certified by their vendors and not by Cloud Software Group. Support for these
backup solutions is provided by the solution vendor.
XenServer Premium Edition customers can take advantage of the faster changed block only backup.
For more information, see the Citrix blog about Changed Block Tracking backup APIs.
VM snapshots
XenServer provides a convenient mechanism that can take a snapshot of a VM storage and metadata
at a given time. Where necessary, I/O is temporarily halted while the snapshot is being taken to ensure
that a self‑consistent disk image can be captured.
Snapshot operations result in a snapshot VM that is similar to a template. The VM snapshot contains all
the storage information and VM configuration, including attached VIFs, allowing them to be exported
and restored for backup purposes. Snapshots are supported on all storage types. However, for the
LVM‑based storage types the following requirements must be met:
• If the storage repository was created on a previous version of XenServer, it must have been up‑
graded
• The volume must be in the default format (you cannot take a snapshot of type=raw volumes)
The following types of VM snapshots are supported: regular and snapshot with memory.
Regular snapshots
Regular snapshots are crash consistent and can be performed on all VM types, including Linux VMs.
In addition to saving the VMs memory (storage) and metadata, snapshots with memory also save the
VMs state (RAM). This feature can be useful when you upgrade or patch software, but you also want
the option to revert to the pre‑change VM state (RAM). Reverting to a snapshot with memory, does not
require a reboot of the VM.
You can take a snapshot with memory of a running or suspended VM by using the management API,
the xe CLI, or XenCenter.
Create a VM snapshot
Before taking a snapshot, see the following information about any special operating system‑specific
configuration and considerations:
First, ensure that the VM is running or suspended so that the memory status can be captured. The
simplest way to select the VM on which the operation is to be performed is by supplying the argument
vm=name or vm=vm uuid.
Run the vm-checkpoint command, giving a descriptive name for the snapshot with memory, so
that you can identify it later:
When XenServer has completed creating the snapshot with memory, its UUID is displayed.
For example:
1 xe vm-checkpoint vm=2d1d9a08-e479-2f0a-69e7-24a0e062dd35 \
2 new-name-label=example_checkpoint_1
3 b3c0f369-59a1-dd16-ecd4-a1211df29886
A snapshot with memory requires at least 4 MB of disk space per disk, plus the size of the RAM, plus
around 20% overhead. So a checkpoint with 256 MB RAM would require approximately 300 MB of
storage.
Note:
During the checkpoint creation process, the VM is paused for a brief period, and cannot be used
during this period.
1 xe snapshot-list
1 xe vm-list
This command displays a list of all VMs and their UUIDs. For example:
1 xe vm-list
2 uuid ( RO): 116dd310-a0ef-a830-37c8-df41521ff72d
3 name-label ( RW): Windows Server 2016 (1)
4 power-state ( RO): halted
5
6 uuid ( RO): dff45c56-426a-4450-a094-d3bba0a2ba3f
7 name-label ( RW): Control domain on host
8 power-state ( RO): running
VMs can also be specified by filtering the full list of VMs on the values of fields.
For example, specifying power-state=halted selects all VMs whose power‑state field is equal to
‘halted’. Where multiple VMs are matching, the option --multiple must be specified to perform
the operation. Obtain the full list of fields that can be matched by using the command xe vm-list
params=all.
For example:
1 xe snapshot-list snapshot-of=2d1d9a08-e479-2f0a-69e7-24a0e062dd35
Ensure that you have the UUID of the snapshot that you want to revert to, and then run the snapshot
-revert command:
1. Run the snapshot-list command to find the UUID of the snapshot or checkpoint that you
want to revert to:
1 xe snapshot-list
2. Note the UUID of the snapshot, and then run the following command to revert:
For example:
1 xe snapshot-revert snapshot-uuid=b3c0f369-59a1-dd16-ecd4-
a1211df29886
Notes:
• If there’s insufficient disk space available to thickly provision the snapshot, you cannot re‑
store to the snapshot until the current disk’s state has been freed. If this issue occurs, retry
the operation.
• It is possible to revert to any snapshot. Existing snapshots and checkpoints are not deleted
during the revert operation.
Delete a snapshot
Ensure that you have the UUID of the checkpoint or snapshot that you want to remove, and then run
the following command:
1. Run the snapshot-list command to find the UUID of the snapshot or checkpoint that you
want to revert to:
1 xe snapshot-list
2. Note the UUID of the snapshot, and then run the snapshot-uninstall command to remove
it:
1 xe snapshot-uninstall snapshot-uuid=snapshot-uuid
3. This command alerts you to the VM and VDIs that are deleted. Type yes to confirm.
For example:
1 xe snapshot-uninstall snapshot-uuid=1760561d-a5d1-5d5e-2be5-
d0dd99a3b1ef
2 The following items are about to be destroyed
3 VM : 1760561d-a5d1-5d5e-2be5-d0dd99a3b1ef (Snapshot with memory)
4 VDI: 11a4aa81-3c6b-4f7d-805a-b6ea02947582 (0)
5 VDI: 43c33fe7-a768-4612-bf8c-c385e2c657ed (1)
6 VDI: 4c33c84a-a874-42db-85b5-5e29174fa9b2 (Suspend image)
7 Type 'yes' to continue
8 yes
9 All objects destroyed
If you only want to remove the metadata of a checkpoint or snapshot, run the following command:
1 xe snapshot-destroy snapshot-uuid=snapshot-uuid
For example:
1 xe snapshot-destroy snapshot-uuid=d7eefb03-39bc-80f8-8d73-2ca1bab7dcff
Snapshot templates
You can create a VM template from a snapshot. However, its memory state is removed.
1. Use the command snapshot-copy and specify a new-name-label for the template:
1 xe snapshot-copy new-name-label=vm-template-name \
2 snapshot-uuid=uuid of the snapshot
For example:
1 xe snapshot-copy new-name-label=example_template_1
2 snapshot-uuid=b3c0f369-59a1-dd16-ecd4-a1211df29886
Note:
This command creates a template object in the SAME pool. This template exists in the
XenServer database for the current pool only.
2. To verify that the template has been created, run the command template-list:
1 xe template-list
When you export a VM snapshot, a complete copy of the VM (including disk images) is stored as a single
file on your local machine. This file has a .xva file name extension.
For example:
1 xe snapshot-export-to-template snapshot-uuid=b3c0f369-59a1-dd16-
ecd4-a1211df29886 \
2 filename=example_template_export
• As a convenient backup facility for your VMs. An exported VM file can be used to recover an entire
VM in a disaster scenario.
• As a way of quickly copying a VM, for example, a special‑purpose server configuration that you
use many times. You simply configure the VM the way you want it, export it, and then import it
to create copies of your original VM.
For more information about the use of templates, see Create VMs and also the Managing VMs article
in the XenCenter documentation.
Scheduled snapshots
The Scheduled Snapshots feature provides a simple backup and restore utility for your critical ser‑
vice VMs. Regular scheduled snapshots are taken automatically and can be used to restore individual
VMs. Scheduled Snapshots work by having pool‑wide snapshot schedules for selected VMs in the pool.
When a snapshot schedule is enabled, Snapshots of the specified VM are taken at the scheduled time
each hour, day, or week. Several Scheduled Snapshots may be enabled in a pool, covering different
VMs and with different schedules. A VM can be assigned to only one snapshot schedule at a time.
• To enable, disable, edit, and delete Scheduled Snapshots for a pool, use the VM Snapshot
Schedules dialog box.
• To edit a snapshot schedule, open its Properties dialog box from the VM Snapshot Schedules
dialog box.
• To revert a VM to a scheduled snapshot, select the snapshot on the Snapshots tab and revert
the VM to it.
This section provides details of how to recover from various failure scenarios. All failure recovery sce‑
narios require the use of one or more of the backup types listed in Backup.
Member failures
In the absence of HA, pool coordinator nodes detect the failures of members by receiving regular heart‑
beat messages. If no heartbeat has been received for 600 seconds, the pool coordinator assumes the
member is dead. There are two ways to recover from this problem:
• Repair the dead host (for example, by physically rebooting it). When the connection to the mem‑
ber is restored, the pool coordinator marks the member as alive again.
• Shut down the host and instruct the pool coordinator to forget about the member node using
the xe host-forget CLI command. Once the member has been forgotten, all the VMs which
were running there are marked as offline and can be restarted on other XenServer hosts.
It is important to ensure that the XenServer host is actually offline, otherwise VM data corruption
might occur.
Do not to split your pool into multiple pools of a single host by using xe host-forget. This
action might result in them all mapping the same shared storage and corrupting VM data.
Warning:
• If you are going to use the forgotten host as an active host again, perform a fresh installation
of the XenServer software.
• Do not use xe host-forget command if HA is enabled on the pool. Disable HA first,
then forget the host, and then re‑enable HA.
When a member XenServer host fails, there might be VMs still registered in the running state. If you are
sure that the member XenServer host is definitely down, use the xe vm-reset-powerstate CLI
command to set the power state of the VMs to halted. See vm‑reset‑powerstate for more details.
Warning:
Incorrect use of this command can lead to data corruption. Only use this command if necessary.
Before you can start VMs on another XenServer host, you are also required to release the locks on VM
storage. Only on host at a time can use each disk in an SR. It is key to make the disk accessible to
other XenServer hosts once a host has failed. To do so, run the following script on the pool coordina‑
tor for each SR that contains disks of any affected VMs: /opt/xensource/sm/resetvdis.py
host_UUID SR_UUID master
You need only supply the third string (“master”) if the failed host was the SR pool coordinator at the
time of the crash. (The SR pool coordinator is the pool coordinator or a XenServer host using local
storage.)
Warning:
Be sure that the host is down before running this command. Incorrect use of this command can
lead to data corruption.
If you attempt to start a VM on another XenServer host before running the resetvdis.py script,
then you receive the following error message: VDI <UUID> already attached RW.
Every member of a resource pool contains all the information necessary to take over the role of pool
coordinator if necessary. When a pool coordinator node fails, the following sequence of events oc‑
curs:
2. If HA is not enabled, each member waits for the pool coordinator to return.
If the pool coordinator comes back up at this point, it re‑establishes communication with its members,
and operation returns to normal.
If the pool coordinator is dead, choose one of the members and run the command xe pool
-emergency-transition-to-master on it. Once it has become the pool coordinator,
run the command xe pool-recover-slaves and the members now point to the new pool
coordinator.
If you repair or replace the host that was the original pool coordinator, you can simply bring it up, in‑
stall the XenServer software, and add it to the pool. Since the XenServer hosts in the pool are enforced
to be homogeneous, there is no real need to make the replaced host the pool coordinator.
When a member XenServer host is transitioned to being a pool coordinator, check that the default
pool storage repository is set to an appropriate value. This check can be done using the xe pool-
param-list command and verifying that the default-SR parameter is pointing to a valid storage
repository.
Pool failures
In the unfortunate event that your entire resource pool fails, you must recreate the pool database from
scratch. Be sure to regularly back up your pool‑metadata using the xe pool-dump-database CLI
command (see pool-dump-database).
2. For the host nominated as the pool coordinator, restore the pool database from your backup
using the xe pool-restore-database command (see pool‑restore‑database).
3. Connect to the pool coordinator by using XenCenter and ensure that all your shared storage and
VMs are available again.
4. Perform a pool join operation on the remaining freshly installed member hosts, and start up
your VMs on the appropriate hosts.
If the physical host machine is operational but the software or host configuration is corrupted:
If the physical host machine has failed, use the appropriate procedure from the following list to re‑
cover.
Warning:
Any VMs running on a previous member (or the previous host) which have failed are still marked
as Running in the database. This behavior is for safety. Simultaneously starting a VM on two
different hosts would lead to severe disk corruption. If you are sure that the machines (and VMs)
are offline you can reset the VM power state to Halted:
1 xe pool-emergency-transition-to-master
2 xe pool-recover-slaves
1 xe pool-restore-database file-name=backup
Warning:
This command only succeeds if the target machine has an appropriate number of appro‑
priately named NICs.
2. If the target machine has a different view of the storage than the original machine, modify the
storage configuration using the pbd-destroy command. Next use the pbd-create com‑
mand to recreate storage configurations. See pbd commands for documentation of these com‑
mands.
3. If you have created a storage configuration, use pbd-plug or Storage > Repair Storage
Repository menu item in XenCenter to use the new configuration.
Workload Balancing
• Workload Balancing is available for XenServer Premium Edition customers. For more infor‑
mation about XenServer licensing, see Licensing. To upgrade, or to get a XenServer license,
visit the XenServer website.
• Workload Balancing 8.3.0 and later are compatible with XenServer 8. If you perform a rolling
pool upgrade from Citrix Hypervisor 8.2 CU1 to XenServer 8, you cannot use Workload Bal‑
ancing 8.2.2 with your XenServer 8 pools. Update the Workload Balancing virtual appliance
to 8.3.0 before performing the rolling pool upgrade. You can download the latest version of
the Workload Balancing virtual appliance from the XenServer Downloads page.
Workload Balancing is a XenServer Premium Edition component, packaged as a virtual appliance, that
provides the following features:
• Create reports about virtual machine (VM) performance in your XenServer environment
• Evaluate resource utilization and locates VMs on the best possible hosts in the pool for their
workload’s needs
• Determine the best host on which to resume a VM that you powered off
• Determine the optimal server for each of the host’s VMs when you put a host into or take a host
out of maintenance mode
Depending on your preference, Workload Balancing can accomplish these tasks automatically or
prompt you to accept its rebalancing and placement recommendations. You can also configure
Workload Balancing to power off hosts automatically at specific times of day. For example, configure
your hosts to switch off at night to save power.
Workload Balancing can send notifications in XenCenter regarding the actions it takes. For more in‑
formation on how to configure the alert level for Workload Balancing alerts by using the xe CLI, see
Set alert level for Workload Balancing alerts in XenCenter.
Workload Balancing functions by evaluating the use of VMs across a pool. When a host exceeds a
performance threshold, Workload Balancing relocates the VM to a less‑taxed host in the pool. To re‑
balance workloads, Workload Balancing moves VMs to balance the resource use on hosts.
To ensure that the rebalancing and placement recommendations align with your environment’s
needs, you can configure Workload Balancing to optimize workloads in one of the following ways:
These optimization modes can be configured to change automatically at predefined times or stay the
same always. For extra granularity, fine‑tune the weighting of individual resource metrics: CPU, net‑
work, disk, and memory.
To help you perform capacity planning, Workload Balancing provides historical reports about host
and pool health, optimization and VM performance, and VM motion history.
As Workload Balancing captures performance data, you can also use this component to generate re‑
ports, known as Workload Reports, about your virtualized environment. For more information, see
Generate workload reports.
When VMs are running, they consume computing resources on the physical host. These resources
include CPU, Memory, Network Reads, Network Writes, Disk Reads, and Disk Writes. Some VMs, de‑
pending on their workload, might consume more CPU resources than other VMs on the same host.
Workload is defined by the applications running on a VM and their user transactions. The combined
resource consumption of all VMs on a host reduces the available resources on the host.
Workload Balancing captures data for resource performance on VMs and physical hosts and stores it
in a database. Workload Balancing uses this data, combined with the preferences you set, to provide
optimization and placement recommendations.
Optimizations are a way in which hosts are “improved”to align with your goals: Workload Balancing
makes recommendations to redistribute the VMs across hosts in the pool to increase either perfor‑
mance or density. When Workload Balancing is making recommendations, it makes them in light of
its goal: to create balance or harmony across the hosts in the pool. If Workload Balancing acts on
these recommendations, the action is known as an optimization.
When Workload Balancing is enabled, XenCenter provides star ratings to indicate the optimal hosts
for starting a VM. These ratings are also provided:
• Performance is the usage of physical resources on a host (for example, the CPU, memory, net‑
work, and disk utilization on a host). When you set Workload Balancing to maximize perfor‑
mance, it recommends placing VMs to ensure that the maximum amount of resources are avail‑
able for each VM.
• Density is the number of VMs on a host. When you set Workload Balancing to maximize density,
it recommends placing VMs so you can reduce the number of hosts powered on in a pool. It
ensures that the VMs have adequate computing power.
Workload Balancing does not conflict with settings you already specified for High Availability: these
features are compatible.
The latest version of the Workload Balancing virtual appliance is version 8.3.0. You can download this
version of the Workload Balancing virtual appliance from the XenServer Downloads page.
• You can now set the alert level for Workload Balancing alerts in XenCenter by using the Manage‑
ment API.
This update includes changes to the WLB database. Ensure that you use the provided migration script
when you update your WLB to this version. For more information about using the migration script,
see Migrate data from an existing virtual appliance.
• During the Workload Balancing maintenance window, Workload Balancing is unable to provide
placement recommendations. When this situation occurs, you see the error: “4010 Pool discov‑
ery has not been completed. Using original algorithm.”The Workload Balancing maintenance
window is less than 20 minutes long and by default is scheduled at midnight.
• For a Workload Balancing virtual appliance version 8.2.2 and later that doesn’t use LVM, you
cannot extend the available disk space.
• Due to an unresponsive API call, Workload Balancing is sometimes blocked during pool discov‑
ery.
• In XenCenter, the date range and some timestamps shown on the Workload Balancing Pool Au‑
dit Report are incorrect.
• In XenCenter, some strings are not displaying correctly for Workload Reports.
• If the Workload Balancing virtual appliance is running for a long time, it is shut down by the
operating system for consuming a lot of memory.
• The database fails to auto‑restart after the Workload Balancing virtual appliance experiences
an abnormal shutdown.
• If you do not use the default user name (postgres) for the Workload Balancing PostgreSQL
database, you cannot connect your pools to the Workload Balancing virtual appliance.
To work around this issue, use the default user name postgres for the Workload Balancing
database.
• After configuring Workload Balancing on a pool, if your host CPU load is low, you might en‑
counter an Internal error when attempting to put your host into maintenance mode.
To work around this issue, pause the Workload Balancing virtual appliance or disconnect it from
your pools.
Earlier releases
This section lists features in previous releases along with their fixed issues. These earlier releases are
superseded by the latest version of the Workload Balancing virtual appliance. Update to the latest
version of the Workload Balancing virtual appliance when it is available.
This update includes changes to the WLB database. Ensure that you use the provided migration script
when you update your WLB to this version. For more information about using the migration script,
see Migrate data from an existing virtual appliance.
Fixed issues This update includes fixes for the following issues:
• The Workload Balancing database can grow very fast and fill the disk.
• A race condition can sometimes cause records to be duplicated in the WLB database. When this
occurs, the user might see the error: “WLB received an unknown exception”.
• The migration script now enables you to migrate your Workload Balancing database from the
Workload Balancing virtual appliance 8.0.0 (which was provided with Citrix Hypervisor 8.0 and
8.1) to the Workload Balancing virtual appliance 8.2.1 provided with Citrix Hypervisor 8.2.
For more information about using the migration script, see Migrate data from an existing virtual
appliance.
Fixed issues This update includes fixes for the following issues:
• When multiple VMs start at the same time, Workload Balancing recommends balancing the VMs
placement on all hosts in the pool evenly. However, sometimes Workload Balancing might rec‑
ommend to put many VMs on the same XenServer host. This issue occurs when Workload Bal‑
ancing gets late feedback from XAPI about VM placement.
July 1, 2024
You can configure the Workload Balancing virtual appliance in just a few steps:
1. Review the prerequisite information and plan your Workload Balancing usage.
4. Configure Workload Balancing virtual appliance from the virtual appliance console.
5. (Optional) If you already have a previous version of Workload Balancing installed, you can mi‑
grate data from an existing virtual appliance.
Note:
If you perform a rolling pool upgrade from Citrix Hypervisor 8.2 CU1 to XenServer 8, you
cannot use Workload Balancing 8.2.2 and earlier with your XenServer 8 pools. Update your
Workload Balancing virtual appliance to version 8.3.0 before performing the rolling pool
upgrade. You can download the latest version of the Workload Balancing virtual appliance
from the XenServer Downloads page.
6. Connect your pool to the Workload Balancing virtual appliance by using XenCenter.
The Workload Balancing tab only appears in XenCenter if your pool has the required license to
use Workload Balancing.
The Workload Balancing virtual appliance is a single pre‑installed VM designed to run on a XenServer
host. Before importing it, review the prerequisite information and considerations.
Prerequisites
• Workload Balancing 8.3.0 and later are compatible with XenServer 8. We recommend using the
XenCenter management console to import the virtual appliance.
• If you perform a rolling pool upgrade from Citrix Hypervisor 8.2 CU1 to XenServer 8, you cannot
use Workload Balancing 8.2.2 and earlier with your XenServer 8 pools. Update your Workload
Balancing virtual appliance to version 8.3.0 before performing the rolling pool upgrade. You can
download the latest version of the Workload Balancing virtual appliance from the XenServer
Downloads page.
• If you are currently using an earlier version of the Workload Balancing virtual appliance, you can
use the migrate script to migrate your existing data when you upgrade to the latest version. For
more information, see Migrate from an existing virtual appliance.
decrease the number of vCPUs assigned to the virtual appliance if you have a small environment.
For more information, see Change the Workload Balancing virtual appliance configuration.
Pool requirements
To balance a pool with Workload Balancing, the pool must meet the following requirements:
– Gigabit Ethernet
• The pool does not contain any vGPU‑enabled VMs. Workload Balancing cannot create a capacity
plan for VMs that have vGPUs attached.
A single Workload Balancing virtual appliance can manage multiple pools up to a maximum of 100
pools, depending on the virtual appliance’s resources (vCPU, memory, disk size). Across these pools,
the virtual appliance can manage up to 1000 VMs. However, if a pool has a large number of VMs (for
example, more than 400 VMs), we recommend that you use one Workload Balancing virtual appliance
just for that pool.
Considerations
Before importing the virtual appliance, note the following information and make the appropriate
changes to your environment, as applicable.
• Communications port. Before you launch the Workload Balancing Configuration wizard, deter‑
mine the port over which you want the Workload Balancing virtual appliance to communicate.
You are prompted for this port during Workload Balancing Configuration. By default, the Work‑
load Balancing server uses 8012.
Note:
Do not set the Workload Balancing port to port 443. The Workload Balancing virtual appli‑
ance cannot accept connections over port 443 (the standard TLS/HTTPS port).
• Accounts for Workload Balancing. There are three different accounts that are used when con‑
figuring your Workload Balancing virtual appliance and connecting it to XenServer.
The Workload Balancing Configuration wizard creates the following accounts with a user name
and password that you specify:
This account is used by the XenServer host to connect to the Workload Balancing server. By
default, the user name for this account is wlbuser. This user is created on the Workload
Balancing virtual appliance during Workload Balancing configuration.
– Database account
This account is used to access the PostgreSQL database on the Workload Balancing virtual
appliance. By default, the user name is postgres. You set the password for this account
during Workload Balancing configuration.
When connecting the Workload Balancing virtual appliance to a XenServer pool, you must spec‑
ify an existing account:
– XenServer account
This account is used by the Workload Balancing virtual appliance to connect to the
XenServer pool and read the RRDs. Ensure that this user account has the permissions to
read the XenServer pool, host, and VM RRDs. For example, provide the credentials for a
user that has the pool-admin or pool-operator role.
• Monitoring across pools. You can put the Workload Balancing virtual appliance in one pool
and monitor a different pool with it. (For example, the Workload Balancing virtual appliance is
in Pool A but you are using it to monitor Pool B.)
• Time synchronization. The Workload Balancing virtual appliance requires that the time on
the physical computer hosting the virtual appliance matches that in use by the monitored pool.
There is no way to change the time on the Workload Balancing virtual appliance. We recom‑
mend pointing both the physical computer hosting Workload Balancing and the hosts in the
pool it is monitoring to the same Network Time (NTP) server.
• XenServer and Workload Balancing communicate over HTTPS. Therefore, during Workload
Balancing Configuration, Workload Balancing automatically creates a self‑signed certificate on
your behalf. You can change this certificate to one from a certificate authority or configure
XenServer to verify the certificate or both. For information, see the Certificates.
• Storing historical data and disk space size. The amount of historical data you can store is
based on the following:
– The size of the virtual disk allocated to Workload Balancing (by default 30 GB)
– The minimum disk required space, which is 2,048 MB by default and controlled by the
GroomingRequiredMinimumDiskSizeInMB parameter in the wlb.conf file.
The more historical data Workload Balancing collects, the more accurate and balanced the rec‑
ommendations are. If you want to store much historical data, you can do one of the following:
For example, when you want to use the Workload Balancing Pool Audit trail feature and config‑
ure the report granularity to medium or above.
• Load balancing Workload Balancing. If you want to use your Workload Balancing virtual ap‑
pliance to manage itself, specify shared remote storage when importing the virtual appliance.
Note:
Workload Balancing cannot perform Start On placement recommendation for the Work‑
load Balancing virtual appliance when you are using Workload Balancing to manage itself.
The reason that Workload Balancing cannot make placement recommendations when it
is managing itself is because the virtual appliance must be running to perform that func‑
tion. However, it can balance the Workload Balancing virtual appliance just like it would
balance any other VM it is managing.
• Plan for resource pool sizing. Workload Balancing requires specific configurations to run suc‑
cessfully in large pools. For more information, see Change the Workload Balancing virtual ap‑
pliance configuration.
The Workload Balancing virtual appliance is packaged in an .xva format. You can download the
virtual appliance from the XenServer Downloads page. When downloading the file, save it to a folder
on your local hard drive (typically on the computer where XenCenter is installed).
When the .xva download is complete, you can import it into XenCenter as described in Import the
Workload Balancing virtual appliance.
Use XenCenter to import the Workload Balancing virtual appliance into a pool.
1. Open XenCenter.
2. Right‑click on the pool (or host) into which you want to import the virtual appliance package,
and select Import.
4. Select the pool or Home Server where you want to run the Workload Balancing virtual appli‑
ance.
When you select the pool, the VM automatically starts on the most suitable host in that pool.
Alternatively, if you don’t manage the Workload Balancing virtual appliance using Workload
Balancing, you can set a Home Server for the Workload Balancing virtual appliance. This setting
ensures that the virtual appliance always starts on the same host.
5. Choose a storage repository on which to store the virtual disk for the Workload Balancing virtual
appliance. This repository must have a minimum of 30 GB of free space.
You can choose either local or remote storage. However, if you choose local storage, you cannot
manage the virtual appliance with Workload Balancing.
6. Define the virtual interfaces for the Workload Balancing virtual appliance. In this release, Work‑
load Balancing is designed to communicate on a single virtual interface.
7. Choose a network that can access the pool you want Workload Balancing to manage.
8. Leave the Start VMs after import check box enabled, and click Finish to import the virtual
appliance.
9. After you finish importing the Workload Balancing .xva file, the Workload Balancing VM ap‑
pears in the Resource pane in XenCenter.
After importing the Workload Balancing virtual appliance, configure the virtual appliance as described
in Configure the Workload Balancing virtual appliance.
After you finish importing the Workload Balancing virtual appliance, you must configure it before you
can use it to manage your pool. To guide you through the configuration, the Workload Balancing
virtual appliance provides you with a configuration wizard in XenCenter. To display it, select the virtual
appliance in the Resource pane and click the Console tab. For all options, press Enter to accept the
default choice.
1. After importing the Workload Balancing virtual appliance, click the Console tab.
2. Enter yes to accept the terms of the license agreement. To decline the EULA, enter no.
Note:
The Workload Balancing virtual appliance is also subject to the licenses contained in the
/opt/vpx/wlb directory in the Workload Balancing virtual appliance.
3. Enter and confirm a new root password for the Workload Balancing VM. We recommend select‑
ing a strong password.
Note:
When you enter the password, the console does not display placeholders, such as asterisks,
for the characters.
4. Enter the computer name you want to assign to the Workload Balancing virtual appliance.
5. Enter the domain suffix for the virtual appliance.
For example, if the fully qualified domain name (FQDN) for the virtual appliance is wlb-vpx-
pos-pool.domain4.bedford4.ctx, enter domain4.bedford4.ctx.
Note:
The Workload Balancing virtual appliance does not automatically add its FQDN to your
Domain Name System (DNS) server. Therefore, if you want the pool to use an FQDN to
connect to Workload Balancing, you must add the FQDN to your DNS server.
6. Enter y to use DHCP to obtain the IP address automatically for the Workload Balancing VM. Oth‑
erwise, enter n and then enter a static IP address, subnet mask, and gateway for the VM.
Note:
Using DHCP is acceptable provided the lease of the IP address does not expire. It is im‑
portant that the IP address does not change: When it changes, it breaks the connection
between XenServer and Workload Balancing.
7. Enter a user name for the Workload Balancing database, or press Enter to use the default user
name (postgres) of the database account.
Note:
We recommend to use the default user name postgres due to a known issue where you
cannot connect your pools to the Workload Balancing virtual appliance if you do not use
the default user name for the Workload Balancing PostgreSQL database.
You are creating an account for the Workload Balancing database. The Workload Balancing ser‑
vices use this account to read/write to the Workload Balancing database. Note the user name
and password. You might need them if you ever want to administer to the Workload Balancing
PostgreSQL database directly (for example, if you wanted to export data).
8. Enter a password for the Workload Balancing database. After pressing Enter, messages appear
stating that the Configuration wizard is loading database objects.
9. Enter a user name and password for the Workload Balancing Server.
This action creates the account XenServer uses to connect to Workload Balancing. The default
user name is wlbuser.
10. Enter the port for the Workload Balancing Server. The Workload Balancing server communi‑
cates by using this port.
By default, the Workload Balancing server uses 8012. The port number cannot be set to 443,
which is the default TLS port number.
Note:
If you change the port here, specify that new port number when you connect the pool to
Workload Balancing. For example, by specifying the port in the Connect to WLB Server
dialog.
Ensure that the port you specify for Workload Balancing is open in any firewalls.
After you press Enter, Workload Balancing continues with the virtual appliance configuration,
including creating self‑signed certificates.
11. Now, you can also log in to the virtual appliance by entering the VM user name (typically root)
and the root password you created earlier. However, logging in is only required when you want
to run Workload Balancing commands or edit the Workload Balancing configuration file.
After configuring Workload Balancing, connect your pool to the Workload Balancing virtual appliance
as described in Connect to the Workload Balancing virtual appliance.
If necessary, you can find the Workload Balancing configuration file in the following location: /opt/
vpx/wlb/wlb.conf. For more information, see Edit the Workload Balancing configuration file
The Workload Balancing log file is in this location: /var/log/wlb/LogFile.log. For more infor‑
mation, see Increase the detail in the Workload Balancing log.
After configuring Workload Balancing, connect the pools you want managed to the Workload Balanc‑
ing virtual appliance by using either the CLI or XenCenter.
Note:
A single Workload Balancing virtual appliance can manage multiple pools up to a maximum of
100 pools, depending on the virtual appliance’s resources (vCPU, memory, disk size). Across
these pools, the virtual appliance can manage up to 1000 VMs. However, if a pool has a large
number of VMs (for example, more than 400 VMs), we recommend that you use one Workload
Balancing virtual appliance just for that pool.
To connect a pool to your Workload Balancing virtual appliance, you need the following informa‑
tion:
– To specify the Workload Balancing FQDN when connecting to the Workload Balancing
server, first add its host name and IP address to your DNS server.
• The port number of the Workload Balancing virtual appliance. By default, XenServer connects
to Workload Balancing on port 8012.
Only edit the port number when you have changed it during Workload Balancing Configuration.
The port number specified during Workload Balancing Configuration, in any firewall rules, and
in the Connect to WLB Server dialog must match.
• Credentials for the Workload Balancing account you created during Workload Balancing config‑
uration.
This account is often known as the Workload Balancing user account. XenServer uses this ac‑
count to communicate with Workload Balancing. You created this account on the Workload
Balancing virtual appliance during Workload Balancing Configuration.
• Credentials for the resource pool (that is, the pool coordinator) you want Workload Balancing
to monitor.
This account is used by the Workload Balancing virtual appliance to connect to the XenServer
pool. This account is created on the XenServer pool coordinator and has the pool-admin or
pool-operator role.
When you first connect to Workload Balancing, it uses the default thresholds and settings for balanc‑
ing workloads. Automatic features, such as Automated Optimization Mode, Power Management, and
Automation, are disabled by default.
If you want to upload a different (trusted) certificate or configure certificate verification, note the fol‑
lowing before connecting your pool to Workload Balancing:
• If you want XenServer to verify the self‑signed Workload Balancing certificate, you must use the
Workload Balancing IP address to connect to Workload Balancing. The self‑signed certificate is
issued to Workload Balancing based on its IP address.
• If you want to use a certificate from a certificate authority, it is easier to specify the FQDN when
connecting to Workload Balancing. However, you can specify a static IP address in the Con‑
nect to WLB Server dialog. Use this IP address as the Subject Alternative Name (SAN) in the
certificate.
1. In XenCenter, select your resource pool and in its Properties pane, click the WLB tab. The WLB
tab displays the Connect button.
2. In the WLB tab, click Connect. The Connect to WLB Server dialog box appears.
a) In the Address box, type the IP address or FQDN of the Workload Balancing virtual appli‑
ance. For example, WLB-appliance-computername.yourdomain.net.
b) (Optional) If you changed the Workload Balancing port during Workload Balancing Config‑
uration, enter the port number in the Port box. XenServer uses this port to communicate
with Workload Balancing.
4. In the WLB Server Credentials section, enter the user name and password that the pool uses
to connect to the Workload Balancing virtual appliance.
These credentials must be the account you created during Workload Balancing configuration.
By default, the user name for this account is wlbuser.
5. In the Citrix Hypervisor Credentials section, enter the user name and password for the pool
you are configuring. Workload Balancing uses these credentials to connect to the hosts in the
pool.
To use the credentials with which you are currently logged into XenServer, select Use the cur‑
rent XenCenter credentials. If you have assigned a role to this account using the Access Con‑
trol feature (RBAC), ensure that the role has sufficient permissions to configure Workload Bal‑
ancing. For more information, see Workload Balancing Access Control Permissions.
After connecting the pool to the Workload Balancing virtual appliance, Workload Balancing automat‑
ically begins monitoring the pool with the default optimization settings. To modify these settings or
change the priority given to specific resources, wait at least 60 seconds before proceeding. Or wait
until the XenCenter Log shows that discovery is finished.
Important:
After Workload Balancing runs for a time, if you don’t receive optimal placement recommenda‑
tions, evaluate your performance thresholds. This evaluation is described in Understand when
Workload Balancing makes recommendations. It is critical to set Workload Balancing to the cor‑
rect thresholds for your environment or its recommendations might not be appropriate.
If you are using the Workload Balancing virtual appliance provided with XenServer, you can use the
migrate script to migrate your existing data when you upgrade to the latest version (Workload Balanc‑
ing 8.2.1 or later).
The version of Workload Balancing currently provided with XenServer is 8.3.0. However, Workload
Balancing 8.2.0, 8.2.1, and 8.2.2 were previously available with earlier versions of Citrix Hypervisor.
You can also use this migration script to migrate from Workload Balancing 8.2.1 or 8.2.2 to Workload
Balancing 8.3.0.
To use the migrate script, you must have the following information:
• The root password of the existing Workload Balancing virtual appliance for remote SSH access
• The password of the data base user postgres on the existing Workload Balancing virtual ap‑
pliance
• The password of the data base user postgres on the new Workload Balancing virtual appli‑
ance
Leave the existing Workload Balancing virtual appliance running on your pool while you complete the
migration steps.
1. Follow the steps in the preceding section to import the new Workload Balancing virtual appli‑
ance.
2. In the SSH console of the new Workload Balancing virtual appliance, run one of the following
commands.
3. Connect the XenServer pool with the new Workload Balancing virtual appliance.
4. After you are satisfied with the behavior of this version of the Workload Balancing virtual appli‑
ance, you can archive the old version of the virtual appliance.
Notes:
• In the case of a non‑recoverable failure, reimport the latest version of the Workload Balanc‑
ing virtual appliance.
• Do not disconnect the existing Workload Balancing virtual appliance. Otherwise, the data
on the existing virtual appliance is removed.
• Keep the existing Workload Balancing virtual appliance until you have ensured that the new
Workload Balancing virtual appliance is working as required.
• If necessary, you can roll back this migration by reconnecting the old version of the Work‑
load Balancing virtual appliance to the XenServer pool.
July 8, 2024
When you first begin using Workload Balancing, there are some basic tasks you use Workload Balanc‑
ing for regularly:
In addition to enabling you to perform these basic tasks, Workload Balancing is a powerful XenServer
component that optimizes the workloads in your environment. The features that enable you to opti‑
mize your workloads include:
For more information about these more complex features, see Administer Workload Balancing.
Notes:
• Workload Balancing is available for XenServer Premium Edition customers. For more infor‑
mation about XenServer licensing, see Licensing. To upgrade, or to get a XenServer license,
When you have enabled Workload Balancing and you restart an offline VM, XenCenter recommends
the optimal pool members to start the VM on. The recommendations are also known as star ratings
since stars are used to indicate the best host.
When Workload Balancing is enabled, XenCenter provides star ratings to indicate the optimal hosts
for starting a VM. These ratings are also provided:
When you use these features with Workload Balancing enabled, host recommendations appear as star
ratings beside the name of the physical host. Five empty stars indicate the lowest‑rated, and thus least
optimal, host. If you can’t start or migrate a VM to a host, the host name is grayed out in the menu
command for a placement feature. The reason it cannot accept the VM appears beside it.
The term optimal indicates the physical host best suited to hosting your workload. There are several
factors Workload Balancing uses when determining which host is optimal for a workload:
• The amount of resources available on each host in the pool. When a pool runs in Maximum
Performance mode, Workload Balancing tries to balance the VMs across the hosts so that all
VMs have good performance. When a pool runs in Maximum Density mode, Workload Balancing
places VMs onto hosts as densely as possible while ensuring the VMs have sufficient resources.
• The optimization mode in which the pool is running (Maximum Performance or Maximum
Density). When a pool runs in Maximum Performance mode, Workload Balancing places VMs
on hosts with the most resources available of the type the VM requires. When a pool runs in Max‑
imum Density mode, Workload Balancing places VMs on hosts that already have VMs running.
This approach ensures that VMs run on as few hosts as possible.
• The amount and type of resources the VM requires. After Workload Balancing monitors a VM
for a while, it uses the VM metrics to make placement recommendations according to the type
of resources the VM requires. For example, Workload Balancing might select a host with less
available CPU but more available memory if it is what the VM requires.
In general, Workload Balancing functions more effectively and makes better, less frequent optimiza‑
tion recommendations if you start VMs on the hosts it recommends. To follow the host recommenda‑
tions, use one of the placement features to select the host with the most stars beside it. Placement
recommendations can also be useful in Citrix Virtual Desktops environments.
2. From the VM menu, select Start on Server and then select one of the following:
• Optimal Server. The optimal server is the physical host that is best suited to the resource
demands of the VM you are starting. Workload Balancing determines the optimal server
based on its historical records of performance metrics and your placement strategy. The
optimal server is the host with the most stars.
• One of the servers with star ratings listed under the Optimal Server command. Five
stars indicate the most‑recommended (optimal) host and five empty stars indicates the
least‑recommended host.
Tip:
You can also select Start on Server by right‑clicking the VM you want to start in the Resources
pane.
1. In the Resources pane of XenCenter, select the suspended VM you want to resume.
2. From the VM menu, select Resume on Server and then select one of the following:
• Optimal Server. The optimal server is the physical host that is best suited to the resource
demands of the VM you are starting. Workload Balancing determines the optimal server
based on its historical records of performance metrics and your placement strategy. The
optimal server is the host with the most stars.
• One of the servers with star ratings listed under the Optimal Server command. Five
stars indicate the most‑recommended (optimal) host and five empty stars indicates the
least‑recommended host.
Tip:
You can also select Resume on Server by right‑clicking the suspended VM in the Resources pane.
After Workload Balancing is running for a while, it begins to make recommendations about ways in
which you can improve your environment. For example, if your goal is to improve VM density on hosts,
at some point, Workload Balancing might recommend that you consolidate VMs on a host. If you aren’
t running in automated mode, you can choose either to accept this recommendation and apply it or
to ignore it.
Important:
After Workload Balancing runs for a time, if you don’t receive optimal placement recommenda‑
tions, evaluate your performance thresholds. This evaluation is described in Understand when
Workload Balancing makes recommendations. It is critical to set Workload Balancing to the cor‑
rect thresholds for your environment or its recommendations might not be appropriate.
Find out the optimization mode for a pool by using XenCenter to select the pool. Look in the
Configuration section of the WLB tab for the information.
• Performance metrics for resources such as a physical host’s CPU, memory, network, and disk
utilization.
When making placement recommendations, Workload Balancing considers the pool coordina‑
tor for VM placement only if no other host can accept the workload. Likewise, when a pool oper‑
ates in Maximum Density mode, Workload Balancing considers the pool coordinator last when
determining the order to fill hosts with VMs.
The optimization recommendations also display the reason Workload Balancing recommends mov‑
ing the VM. For example, the recommendation displays “CPU”to improve CPU utilization. When Work‑
load Balancing power management is enabled, Workload Balancing also displays optimization recom‑
mendations for hosts it recommends powering on or off. Specifically, these recommendations are for
consolidations.
You can click Apply Recommendations, to perform all operations listed in the Optimization Recom‑
mendations list.
1. In the Resources pane of XenCenter, select the resource pool for which you want to display rec‑
ommendations.
2. Click the WLB tab. If there are any recommended optimizations for any VMs on the selected
resource pool, they display in the Optimization Recommendations section of the WLB tab.
After you click Apply Recommendations, XenCenter automatically displays the Logs tab so you
can see the progress of the VM migration.
If you have Workload Balancing and XenServer High Availability enabled in the same pool, it is help‑
ful to understand how the two features interact. Workload Balancing is designed not to interfere with
High Availability. When there is a conflict between a Workload Balancing recommendation and a High
Availability setting, the High Availability setting always takes precedence. In practice, this prece‑
dence means that:
• If attempting to start a VM on a host violates the High Availability plan, Workload Balancing
doesn’t give you star ratings.
• Workload Balancing does not automatically power off any hosts beyond the number specified
in the Failures allowed box in the Configure HA dialog.
– However, Workload Balancing might still make recommendations to power off more hosts
than the number of host failures to tolerate. (For example, Workload Balancing still recom‑
mends that you power off two hosts when High Availability is only configured to tolerate
one host failure.) However, when you attempt to apply the recommendation, XenCenter
might display an error message stating that High Availability is no longer guaranteed.
– When Workload Balancing runs in automated mode and has power management enabled,
recommendations that exceed the number of tolerated host failures are ignored. In this
situation, the Workload Balancing log shows a message that power‑management recom‑
mendation wasn’t applied because High Availability is enabled.
Workload Balancing captures performance data and can use this data to generate reports, known as
Workload Reports, about your virtualized environment, including reports about hosts and VMs. The
Workload Balancing reports can help you perform capacity planning, determine virtual server health,
and evaluate how effective your configured threshold levels are.
You can use the Pool Health report to evaluate how effective your optimization thresholds are. While
Workload Balancing provides default threshold settings, you might need to adjust these defaults for
them to provide value in your environment. If you do not have the optimization thresholds adjusted
to the correct level for your environment, Workload Balancing recommendations might not be appro‑
priate for your environment.
To run reports, you do not need to configure for Workload Balancing to make placement recommen‑
dations or move VMs. However, you must configure the Workload Balancing component. Ideally, you
must set critical thresholds to values that reflect the point at which the performance of the hosts in
your pool degrades. Ideally, the pool has been running Workload Balancing for a couple of hours or
long enough to generate the data to display in the reports.
Workload Balancing lets you generate reports on three types of objects: physical hosts, resource pools,
and VMs. At a high level, Workload Balancing provides two types of reports:
• Reports for auditing purposes, so you can determine, for example, the number of times a VM
moved
• Chargeback report that shows VM usage and can help you measure and assign costs
You can also display the Workload Reports screen from the WLB tab by clicking the Reports
button.
2. From the Workload Reports screen, select a report from the Reports pane.
3. Select the Start Date and the End Date for the reporting period. Depending on the report you
select, you might be required to specify a host in the Host list.
4. Click Run Report. The report displays in the report window. For information about the meaning
of the reports, see Workload Balancing report glossary.
After generating a report, you can use the toolbar buttons in the report to navigate and perform certain
tasks. To display the name of a toolbar button, pause your mouse over toolbar icon.
Document Map enables you to display a document map that helps you navi
Page Forward/Back enables you to move one page ahead or back in the rep
Back to Parent Report enables you to return to the parent report when wor
Export enables you to export the report as an Acrobat (.PDF) file or as an Exc
Find enables you to search for a word in a report, such as the name of a VM.
You can export a report in either Microsoft Excel or Adobe Acrobat (PDF) formats.
2. Select one of the following items from the Export button menu:
• Excel
Note:
Depending on the export format you select, the report contains different amounts of data. Re‑
ports exported to Excel include all the data available for reports, including “drilldown”data. Re‑
ports exported to PDF and displayed in XenCenter only contain the data that you selected when
you generated the report.
This section provides information about the following Workload Balancing reports:
You can use the Chargeback Utilization Analysis report (“chargeback report”) to determine how much
of a resource a specific department in your organization used. Specifically, the report shows infor‑
mation about all the VMs in your pool, including their availability and resource utilization. Since this
report shows VM up time, it can help you demonstrate Service Level Agreements compliance and avail‑
ability.
The chargeback report can help you implement a simple chargeback solution and facilitate billing. To
bill customers for a specific resource, generate the report, save it as Excel, and edit the spreadsheet
to include your price per unit. Alternatively, you can import the Excel data into your billing system.
If you want to bill internal or external customers for VM usage, consider incorporating department or
customer names in your VM naming conventions. This practice makes reading chargeback reports
easier.
The resource reporting in the chargeback report is, sometimes, based on the allocation of physical
resources to individual VMs.
The average memory data in this report is based on the amount of memory currently allocated to the
VM. XenServer enables you to have a fixed memory allocation or an automatically adjusting memory
allocation (Dynamic Memory Control).
• VM Name. The name of the VM to which the data in the columns in that row applies.
• VM Uptime. The number of minutes the VM was powered on (or, more specifically, appears with
a green icon beside it in XenCenter).
• vCPU Allocation. The number of virtual CPUs configured on the VM. Each virtual CPU receives
an equal share of the physical CPUs on the host. For example, consider the case where you
configured eight virtual CPUs on a host that contains two physical CPUs. If the vCPU Allocation
column has “1”in it, this value is equal to 2/16 of the total processing power on the host.
• Minimum CPU Usage (%). The lowest recorded value for virtual CPU utilization in the reporting
period. This value is expressed as a percentage of the VM’s vCPU capacity. The capacity is based
on the number of vCPUs allocated to the VM. For example, if you allocated one vCPU to a VM,
Minimum CPU Usage represents the lowest percentage of vCPU usage that is recorded. If you
allocated two vCPUs to the VM, the value is the lowest usage of the combined capacity of both
vCPUs as a percentage.
Ultimately, the percentage of CPU usage represents the lowest recorded workload that virtual
CPU handled. For example, if you allocate one vCPU to a VM and the pCPU on the host is 2.4
GHz, 0.3 GHz is allocated to the VM. If the Minimum CPU Usage for the VM was 20%, the VM’s
lowest usage of the physical host’s CPU during the reporting period was 60 MHz.
• Maximum CPU Usage (%). The highest percentage of the VM’s virtual CPU capacity that the
VM consumed during the reporting period. The CPU capacity consumed is a percentage of the
virtual CPU capacity you allocated to the VM. For example, if you allocated one vCPU to the VM,
the Maximum CPU Usage represents the highest recorded percentage of vCPU usage during the
time reported. If you allocated two virtual CPUs to the VM, the value in this column represents
the highest utilization from the combined capacity of both virtual CPUs.
• Average CPU Usage (%). The average amount, expressed as a percentage, of the VM’s virtual
CPU capacity that was in use during the reporting period. The CPU capacity is the virtual CPU
capacity you allocated to the VM. If you allocated two virtual CPUs to the VM, the value in this
column represents the average utilization from the combined capacity of both virtual CPUs.
• Total Storage Allocation (GB). The amount of disk space that is currently allocated to the VM
at the time the report was run. Frequently, unless you modified it, this disk space is the amount
of disk space you allocated to the VM when you created it.
• Virtual NIC Allocation. The number of virtual interfaces (VIFs) allocated to the VM.
– Fixed memory allocation. If you assigned a VM a fixed amount of memory (for example,
1,024 MB), the same amount of memory appears in the following columns: Current Mini‑
mum Dynamic Memory (MB), Current Maximum Dynamic Memory (MB), Current Assigned
Memory (MB), and Average Assigned Memory (MB).
– Dynamic memory allocation. If you configured XenServer to use Dynamic Memory Con‑
trol, the minimum amount of memory specified in the range appears in this column. If the
range has 1,024 MB as minimum memory and 2,048 MB as maximum memory, the Current
Minimum Dynamic Memory (MB) column displays 1,024 MB.
– Fixed memory allocation. If you assign a VM a fixed amount of memory (for example,
1,024 MB), the same amount of memory appears in the following columns: Current Mini‑
mum Dynamic Memory (MB), Current Maximum Dynamic Memory (MB), Current Assigned
Memory (MB), and Average Assigned Memory (MB).
– Dynamic memory allocation. When Dynamic Memory Control is configured, this value
indicates the amount of memory XenServer allocates to the VM when the report runs.
– Fixed memory allocation. If you assign a VM a fixed amount of memory (for example,
1,024 MB), the same amount of memory appears in the following columns: Current Mini‑
mum Dynamic Memory (MB), Current Maximum Dynamic Memory (MB), Current Assigned
Memory (MB), and Average Assigned Memory (MB).
Note:
If you change the VM’s memory allocation immediately before running this report, the
value reflected in this column reflects the new memory allocation you configured.
– Dynamic memory allocation. When Dynamic Memory Control is configured, this value
indicates the average amount of memory XenServer allocated to the VM over the reporting
period.
– Fixed memory allocation. If you assign a VM a fixed amount of memory (for example,
1,024 MB), the same amount of memory appears in the following columns: Current Mini‑
mum Dynamic Memory (MB), Current Maximum Dynamic Memory (MB), Current Assigned
Memory (MB), and Average Assigned Memory (MB).
Note:
If you change the VM’s memory allocation immediately before running this report, the
value in this column might not change from what was previously displayed. The value in
this column reflects the average over the time period.
• Average Network Reads (BPS). The average amount of data (in bits per second) the VM re‑
ceived during the reporting period.
• Average Network Writes (BPS). The average amount of data (in bits per second) the VM sent
during the reporting period.
• Average Network Usage (BPS). The combined total (in bits per second) of the Average Network
Reads and Average Network Writes. If a VM sends, on average, 1,027 bps and receives, on aver‑
age, 23,831 bps during the reporting period, the Average Network Usage is the combined total
of these values: 24,858 bps.
• Total Network Usage (BPS). The total of all network read and write transactions in bits per
second over the reporting period.
This report displays the performance of resources (CPU, memory, network reads, and network writes)
on specific host in relation to threshold values.
The colored lines (red, green, yellow) represent your threshold values. You can use this report with
the Pool Health report for a host to determine how the host’s performance might affect overall pool
health. When you are editing the performance thresholds, you can use this report for insight into host
performance.
You can display resource utilization as a daily or hourly average. The hourly average lets you see the
busiest hours of the day, averaged, for the time period.
To view report data which is grouped by hour, under Host Health History expand Click to view report
data grouped by house for the time period.
Workload Balancing displays the average for each hour for the time period you set. The data point is
based on a utilization average for that hour for all days in the time period. For example, in a report for
May 1, 2009, to May 15, 2009, the Average CPU Usage data point represents the resource utilization of
all 15 days at 12:00 hours. This information is combined as an average. If CPU utilization was 82% at
12PM on May 1, 88% at 12PM on May 2, and 75% on all other days, the average displayed for 12PM is
76.3%.
Note:
Workload Balancing smoothes spikes and peaks so data does not appear artificially high.
The optimization performance report displays optimization events against that pool’s average re‑
source usage. These events are instances when you optimized a resource pool. Specifically, it displays
resource usage for CPU, memory, network reads, and network writes.
The dotted line represents the average usage across the pool over the period of days you select. A
blue bar indicates the day on which you optimized the pool.
This report can help you determine if Workload Balancing is working successfully in your environment.
You can use this report to see what led up to optimization events (that is, the resource usage before
Workload Balancing recommended optimizing).
This report displays average resource usage for the day. It does not display the peak utilization, such
as when the system is stressed. You can also use this report to see how a resource pool is performing
when Workload Balancing is not making optimization recommendations.
In general, resource usage declines or stays steady after an optimization event. If you do not see
improved resource usage after optimization, consider readjusting threshold values. Also, consider
whether the resource pool has too many VMs and whether you added or removed new VMs during the
period that you specified.
This report displays the contents of the XenServer Audit Log. The Audit Log is a XenServer feature de‑
signed to log attempts to perform unauthorized actions and select authorized actions. These actions
include:
The report gives more meaningful information when you give XenServer administrators their own user
accounts with distinct roles assigned to them by using the RBAC feature.
Important:
To run the audit log report, you must enable the Audit Logging feature. By default, Audit Log is
always enabled in the Workload Balancing virtual appliance.
The enhanced Pool Audit Trail feature allows you to specify the granularity of the audit log report. You
can also search and filter the audit trail logs by specific users, objects, and by time. The Pool Audit
Trail Granularity is set to Minimum by default. This option captures limited amount of data for specific
users and object types. You can modify the setting at any time based on the level of detail you require
in your report. For example, set the granularity to Medium for a user‑friendly report of the audit log.
If you require a detailed report, set the option to Maximum.
• User Name. The name of the person who created the session in which the action was performed.
Sometimes, this value can be the User ID
• Event Object. The object that was the subject of the action (for example, a VM).
• Event Action. The action that occurred. For definitions of these actions, see Audit Log Event
Names.
• Object Name. The name of the object (for example, the name of the VM).
• Object UUID. The UUID of the object (for example, the UUID of the VM).
• Succeeded. This information provides the status of the action (that is, whether it was success‑
ful).
Audit Log event names The Audit Log report logs XenServer events, event objects and actions, in‑
cluding import/export, host and pool backups, and guest and host console access. The following table
defines some of the typical events that appear frequently in the XenServer Audit Log and Pool Audit
Trail report. The table also specifies the granularity of these events.
In the Pool Audit Trail report, the events listed in the Event Action column apply to a pool, VM, or
host. To determine what the events apply to, see the Event Object and Object Name columns
in the report. For more event definitions, see the events section of the XenServer Management API.
Pool Health
The Pool Health report displays the percentage of time a resource pool and its hosts spent in four
different threshold ranges: Critical, High, Medium, and Low. You can use the Pool Health report to
evaluate the effectiveness of your performance thresholds.
• Resource utilization in the Average Medium Threshold (blue) is the optimum resource utilization
regardless of the placement strategy you selected. Likewise, the blue section on the pie chart
indicates the amount of time that host used resources optimally.
• Resource utilization in the Average Low Threshold Percent (green) is not necessarily positive.
Whether Low resource utilization is positive depends on your placement strategy. If your place‑
ment strategy is Maximum Density and resource usage is green, Workload Balancing might not
be fitting the maximum number of VMs on that host or pool. If so, adjust your performance
threshold values until most of your resource utilization falls into the Average Medium (blue)
threshold range.
• Resource utilization in the Average Critical Threshold Percent (red) indicates the amount of time
average resource utilization met or exceeded the Critical threshold value.
If you double‑click on a pie chart for a host’s resource usage, XenCenter displays the Host Health
History report for that resource on that host. Clicking Back to Parent Report on the toolbar returns
you to the Pool Health history report.
If you find that most of your report results are not in the Average Medium Threshold range, adjust the
Critical threshold for this pool. While Workload Balancing provides default threshold settings, these
defaults are not effective in all environments. If you do not have the thresholds adjusted to the correct
level for your environment, the Workload Balancing optimization and placement recommendations
might not be appropriate. For more information, see Change the critical thresholds.
This report provides a line graph of resource utilization on all physical hosts in a pool over time. It
lets you see the trend of resource utilization—if it tends to be increasing in relation to your thresholds
(Critical, High, Medium, and Low). You can evaluate the effectiveness of your performance thresholds
by monitoring trends of the data points in this report.
Workload Balancing extrapolates the threshold ranges from the values you set for the Critical thresh‑
olds when you connected the pool to Workload Balancing. Although similar to the Pool Health report,
the Pool Health History report displays the average utilization for a resource on a specific date. Instead
of the amount of time overall the resource spent in a threshold.
Except for the Average Free Memory graph, the data points never average above the Critical thresh‑
old line (red). For the Average Free Memory graph, the data points never average below the Critical
threshold line (which is at the bottom of the graph). Because this graph displays free memory, the
Critical threshold is a low value, unlike the other resources.
A few points about interpreting this report:
• When the Average Usage line in the chart approaches the Average Medium Threshold (blue) line,
it indicates the pool’s resource utilization is optimum. This indication is regardless of the place‑
ment strategy configured.
• Resource utilization approaching the Average Low Threshold (green) is not necessarily positive.
Whether Low resource utilization is positive depends on your placement strategy. In the case
where:
• When the Average Usage line intersects with the Average Critical Threshold (red), it indicates
when the average resource utilization met or exceeded the Critical threshold value for that re‑
source.
If data points in your graphs aren’t in the Average Medium Threshold range, but the performance is
satisfactory, you can adjust the Critical threshold for this pool. For more information, see Change the
critical thresholds.
The Pool Optimization History report provides chronological visibility into Workload Balancing opti‑
mization activity.
Optimization activity is summarized graphically and in a table. Drilling into a date field within the
table displays detailed information for each pool optimization performed for that day.
• From Host: The physical host where the VM was originally hosted.
Tip:
You can also generate a Pool Optimization History report from the WLB tab by clicking the View
History link.
This line graph displays the number of times VMs migrated on a resource pool over a period. It indi‑
cates if a migration resulted from an optimization recommendation and to which host the VM moved.
This report also indicates the reason for the optimization. You can use this report to audit the number
of migrations on a pool.
• The numbers on the left side of the chart correspond with the number of migrations possible.
This value is based on how many VMs are in a resource pool.
• You can look at details of the migrations on a specific date by expanding the + sign in the Date
section of the report.
This report displays performance data for each VM on a specific host for a time period you specify.
Workload Balancing bases the performance data on the amount of virtual resources allocated for the
VM. For example, if Average CPU Usage for your VM is 67%, your VM uses, on average, 67% of its vCPU
for the specified period.
The initial view of the report displays an average value for resource utilization over the period you
specified.
Expanding the + sign displays line graphs for individual resources. You can use these graphs to see
trends in resource utilization over time.
This report displays data for CPU Usage, Free Memory, Network Reads/Writes, and Disk Read‑
s/Writes.
July 8, 2024
After connecting to the Workload Balancing virtual appliance, you can edit the settings Workload Bal‑
ancing uses to calculate placement and recommendations. Workload Balancing settings apply collec‑
tively to all VMs and hosts in the pool.
Placement and optimization settings that you can modify include the following:
Provided the network and disk thresholds align with the hardware in your environment, consider us‑
ing most of the defaults in Workload Balancing initially. After Workload Balancing is enabled for a
while, we recommend evaluating your performance thresholds and determining whether to edit them.
For example, consider the following cases:
• Getting recommendations when they are not yet required. If so, try adjusting the thresholds
until Workload Balancing begins providing suitable recommendations.
• Not getting recommendations when you expect to receive them. For example, if your network
has insufficient bandwidth and you do not receive recommendations, you might have to tweak
your settings. If so, try lowering the network critical thresholds until Workload Balancing begins
providing recommendations.
Before you edit your thresholds, you can generate a Pool Health report and the Pool Health History
report for each physical host in the pool. For more information, see Generate workload reports.
Notes:
• Workload Balancing is available for XenServer Premium Edition customers. For more infor‑
mation about XenServer licensing, see Licensing. To upgrade, or to get a XenServer license,
visit the XenServer website.
• Workload Balancing 8.3.0 is compatible with XenServer 8 and Citrix Hypervisor 8.2 CU1.
• The base OS of the Workload Balancing virtual appliance was originally derived from
a general‑purpose Linux distribution. The Workload Balancing virtual appliance in its
entirety is supported by XenServer as documented in the XenServer Product Matrix
(https://www.xenserver.com/support).
This article assumes that you already connected your pool to a Workload Balancing virtual appliance.
For information about downloading, importing, configuring, and connecting to a Workload Balancing
virtual appliance, see Get started.
Workload Balancing makes recommendations to rebalance, or optimize, the VM workload in your en‑
vironment based on a strategy for placement you select. The placement strategy is known as the
optimization mode.
Workload Balancing attempts to spread workload evenly across all physical hosts in a resource
pool. The goal is to minimize CPU, memory, and network pressure for all hosts. When Maximize
Performance is your placement strategy, Workload Balancing recommends optimization when
a host reaches the High threshold.
• Maximize Density
Workload Balancing attempts to minimize the number of physical hosts that must be online by
consolidating the active VMs.
When you select Maximize Density as your placement strategy, you can specify parameters sim‑
ilar to the ones in Maximize Performance. However, Workload Balancing uses these parame‑
ters to determine how it can pack VMs onto a host. If Maximize Density is your placement strat‑
egy, Workload Balancing recommends consolidation optimizations when a VM reaches the Low
threshold.
Workload Balancing also lets you apply these optimization modes always, fixed, or switch between
modes for specified time periods, scheduled:
Fixed optimization modes set Workload Balancing to have a specific optimization behavior always.
This behavior can be either to try to create the best performance or to create the highest density.
5. In the Fixed section of the Optimization Mode page, select one of these optimization modes:
• Maximize Performance (default). Attempts to spread workload evenly across all physical
hosts in a resource pool. The goal is to minimize CPU, memory, and network pressure for
all hosts.
• Maximize Density. Attempts to fit as many VMs as possible onto a physical host. The goal
is to minimize the number of physical hosts that must be online.
Scheduled optimization modes let you schedule for Workload Balancing to apply different optimiza‑
tion modes depending on the time of day. For example, you might want to configure Workload Bal‑
ancing to optimize for performance during the day when you have users connected. To save energy,
you can then specify for Workload Balancing to optimize for Maximum Density at night.
When you configure scheduled optimization modes, Workload Balancing automatically changes to
the optimization mode at the beginning of the time period you specified. You can configure Everyday,
Weekdays, Weekends, or individual days. For the hour, you select a time of day.
To set a schedule for your optimization modes, complete the following steps:
5. In the Optimization Mode pane, select Scheduled. The Scheduled section becomes available.
• Maximize Performance. Attempts to spread workload evenly across all physical hosts in a
resource pool. The goal is to minimize CPU, memory, and network pressure for all hosts.
• Maximize Density. Attempts to fit as many VMs as possible onto a physical host. The goal
is to minimize the number of physical hosts that must be online.
8. Select the day of the week and the time when you want Workload Balancing to begin operating
in this mode.
9. Repeat the preceding steps to create more scheduled mode tasks until you have the number you
need. If you only schedule one task, Workload Balancing switches to that mode as scheduled,
but then it never switches back.
5. Select the task that you want to delete or disable from the Scheduled Mode Changes list.
• Stop the task from running temporarily: Right‑click the task and click Disable.
Tips:
– You can also disable or enable tasks by selecting the task, clicking Edit, and se‑
lecting the Enable Task check box in the Optimization Mode Scheduler dialog.
– To re‑enable a task, right‑click the task in the Scheduled Mode Changes list and
click Enable.
• Edit the task: Double‑click the task that you want to edit. In the Change to box, select a
different mode or make other changes as desired.
Note:
Clicking Cancel, before clicking OK, undoes any changes you made in the Optimization tab, in‑
cluding deleting a task.
You can configure Workload Balancing to apply recommendations automatically and turn hosts on
or off automatically. To power down hosts automatically (for example, during low‑usage periods),
you must configure Workload Balancing to apply recommendations automatically and enable power
management. Both power management and automation are described in the sections that follow.
Workload Balancing lets you configure for it to apply recommendations on your behalf and perform
the optimization actions it recommends automatically. You can use this feature, which is known as
automatic optimization acceptance, to apply any recommendations automatically, including ones to
improve performance or power down hosts. However, to power down hosts as VMs usage drops, you
must configure automation, power management, and Maximum Density mode.
By default, Workload Balancing does not apply recommendations automatically. If you want Work‑
load Balancing to apply recommendations automatically, enable automation. If you do not, you must
apply recommendations manually by clicking Apply Recommendations.
Workload Balancing does not automatically apply recommendations to hosts or VMs when the rec‑
ommendations conflict with HA settings. If a pool becomes overcommitted by applying Workload
Balancing optimization recommendations, XenCenter prompts you whether you want to continue ap‑
plying the recommendation. When automation is enabled, Workload Balancing does not apply any
power‑management recommendations that exceed the number of host failures to tolerate in the HA
plan.
When Workload Balancing is running with the automation feature enabled, this behavior is sometimes
called running in automated mode.
It is possible to tune how Workload Balancing applies recommendations in automated mode. For
information, see Set conservative or aggressive automated recommendations.
• Automatically apply Optimization recommendations. When you select this option, you
do not need to accept optimization recommendations manually. Workload Balancing au‑
tomatically accepts the optimization and placement recommendations that it makes.
• Automatically apply Power Management recommendations. The behavior of this op‑
tion varies according to the optimization mode of the pool:
• Specifying the number of times Workload Balancing must make an optimization recom‑
mendation before the recommendation is applied automatically. The default is three
times, which means the recommendation is applied on the third time it is made.
• Selecting the lowest level of optimization recommendation that you want Workload Bal‑
ancing to apply automatically. The default is High.
• Changing the aggressiveness with which Workload Balancing applies its optimization rec‑
ommendations.
You might also want to specify the number of minutes Workload Balancing has to wait
before applying an optimization recommendation to a recently moved VM.
All of these settings are explained in more depth in Set conservative or aggressive auto‑
mated recommendations.
a) In the Power Management section, select the hosts that you want Workload Balancing to
recommend powering on and off.
Note:
If none of the hosts in the resource pool support remote power management, Workload
Balancing displays the message, “No hosts support Power Management.”
b) Click OK.
The term power management means the ability to the turn the power on or off for physical hosts. In
a Workload Balancing context, this term means powering hosts in a pool on or off based on the total
• The hardware for the host has remote power on/off capabilities.
• The Host Power On feature is configured for the host. To configure the Host Power On feature
for the host, see Configure Host Power On feature.
• The host has been explicitly selected as a host to participate in Workload Balancing power man‑
agement.
In addition, if you want Workload Balancing to power off hosts automatically, configure Workload
Balancing to do the following actions:
When a host is set to participate in power management, Workload Balancing makes power‑on and
power‑off recommendations as needed.
• When Workload Balancing detects unused resources in a pool, it recommends powering off
hosts until it eliminates all excess capacity.
• If there isn’t enough host capacity in the pool to shut down hosts, Workload Balancing recom‑
mends leaving the hosts on until the pool workload decreases enough.
• When you configure Workload Balancing to power off extra hosts automatically, it applies these
recommendations automatically and, so, behaves in the same way.
• If you configure Workload Balancing to power on hosts automatically, Workload Balancing pow‑
ers on hosts when resource utilization on a host exceeds the High threshold.
• Workload Balancing never powers off hosts after it has powered them on.
If you turn on the option to apply power management recommendations automatically, you do so at
the pool level. However, you can specify which hosts from the pool you want to participate in power
management.
Configure Host Power On feature To configure the Host Power On feature for your host, follow
these steps:
3. For the Power On mode, select a Power On mode which can enable remote server startup.
• Automatically apply Optimization recommendations. When you select this option, you
do not need to accept optimization recommendations manually. Workload Balancing au‑
tomatically accepts the optimization and placement recommendations that it makes.
9. For Power Management, select the name of the Host Server that you’re currently configuring.
Before Workload Balancing recommends powering hosts on or off, it selects the hosts to transfer VMs
to. It does so in the following order:
1. Filling the pool coordinator since it is the host that cannot be powered off.
2. Filling the host with the most VMs.
3. Filling subsequent hosts according to which hosts have the most VMs running.
When Workload Balancing fills the pool coordinator, it does so assuming artificially low thresholds
for the coordinator. Workload Balancing uses these low thresholds as a buffer to prevent the pool
coordinator from being overloaded.
When Workload Balancing detects a performance issue while the pool is in Maximum Density mode,
it recommends migrating workloads among the powered‑on hosts. If Workload Balancing cannot re‑
solve the issue using this method, it attempts to power on a host. Workload Balancing determines
which hosts to power on by applying the same criteria that it would if the optimization mode was set
to Maximum Performance.
When Workload Balancing runs in Maximum Performance mode, Workload Balancing recommends
powering on hosts until the resource utilization on all pool members falls below the High threshold.
While migrating VMs, if Workload Balancing determines that increasing capacity benefits the overall
performance of the pool, it powers on hosts automatically or recommends doing so.
Important:
Workload Balancing only recommends powering on a host that Workload Balancing powered off.
When you are planning a XenServer implementation and you intend to configure automatic VM con‑
solidation and power management, consider your workload design. For example, you might want
to:
If you have an environment with distinct types of workloads, consider whether to locate the
VMs hosting these workloads in different pools. Also consider splitting VMs that host types of
applications that perform better with certain types of hardware into different pool.
Because power management and VM consolidation are managed at the pool level, design pools
so they contain workloads that you want consolidated at the same rate. Ensure that you factor
in considerations such as those discussed in Configure advanced settings.
Some hosts might need to be always on. For more information, see Exclude hosts from recom‑
mendations.
Workload Balancing continuously evaluates the resource metrics of physical hosts and VMs across the
pools that it is managing against thresholds. Thresholds are preset values that function like bound‑
aries that a host must exceed before Workload Balancing can make an optimization recommendation.
The Workload Balancing process is as follows:
1. Workload Balancing detects that the threshold for a resource was violated.
3. Workload Balancing determines which hosts it recommends function as the destination hosts
and in what order to make any optimizations. A destination host is the host where Workload
Balancing recommends relocating one or more VMs.
When evaluating hosts in the pool to make an optimization recommendation, Workload Balancing
uses thresholds and weightings as follows:
• Thresholds are the boundary values that Workload Balancing compares the resource metrics
of your pool against. The thresholds are used to determine whether to make a recommendation
and what hosts are a suitable candidate for hosting relocated VMs.
• Weightings are a way of ranking resources according to how much you want them to be consid‑
ered, are used to determine the processing order. After Workload Balancing decides to make
a recommendation, it uses your specifications of which resources are important to determine
the following:
For each resource Workload Balancing monitors, it has four levels of thresholds: Critical, High,
Medium, and Low. Workload Balancing evaluates whether to make a recommendation when a
resource metric on a host:
• Exceeds the High threshold when the pool is running in Maximum Performance mode (improve
performance)
• Drops below the Low threshold when the pool is running in Maximum Density mode (consoli‑
date VMs on hosts)
• Exceeds the Critical threshold when the pool is running in Maximum Density mode (improve
performance)
If the High threshold for a pool running in Maximum Performance mode is 80%, when CPU utilization
on a host reaches 80.1%, Workload Balancing evaluates whether to issue a recommendation.
When a resource violates its threshold, Workload Balancing evaluates the resource metric against his‑
torical performance to prevent making an optimization recommendation based on a temporary spike.
To do so, Workload Balancing creates a historically averaged utilization metric by evaluating the data
for resource utilization captured at the following times:
If CPU utilization on the host exceeds the threshold at 12:02 PM, Workload Balancing checks the uti‑
lization at 11:32 AM that day, and at 12:02PM on the previous day. For example, if CPU utilization is at
the following values, Workload Balancing doesn’t make a recommendation:
This behavior is because the historically averaged utilization is 72.5%, so Workload Balancing assumes
that the utilization is a temporary spike. However, if the CPU utilization was 83% at 11:32AM, Workload
Balancing makes a recommendation since the historically averaged utilization is 80.1%.
The Workload Balancing process for determining potential optimizations varies according to the op‑
timization mode ‑ Maximum Performance or Maximum Density. However, regardless of the optimiza‑
tion mode, the optimization and placement recommendations are made using a two‑stage process:
Note:
Workload Balancing only recommends migrating VMs that meet the XenServer criteria for live
migration. One of these criteria is that the destination host must have the storage the VM requires.
The destination host must also have sufficient resources to accommodate adding the VM without
exceeding the thresholds of the optimization mode configured on the pool. For example, the
High threshold in Maximum Performance mode and the Critical threshold for Maximum Density
mode.
When Workload Balancing is running in automated mode, you can tune the way it applies recommen‑
dations. For more information, see Set conservative or aggressive automated recommendations.
1. Every two minutes Workload Balancing evaluates the resource utilization for each host in the
pool. It does so by monitoring on each host and determining if each resource’s utilization ex‑
ceeds its High threshold. For more information, see Change the critical threshold.
In Maximum Performance mode, if a utilization of a resource exceeds its High threshold, Work‑
load Balancing starts the process to determine whether to make an optimization recommen‑
dation. Workload Balancing determines whether to make an optimization recommendation
based on whether doing so can ease performance constraints, such as ones revealed by the
High threshold.
For example, consider the case where Workload Balancing sees that insufficient CPU resources
negatively affect the performance of the VMs on a host. If Workload Balancing can find another
host with less CPU utilization, it recommends moving one or more VMs to another host.
2. If a resource’s utilization on a host exceeds the relevant threshold, Workload Balancing com‑
bines the following data to form the historically averaged utilization:
3. Workload Balancing uses metric weightings to determine what hosts to optimize first. The re‑
source to which you have assigned the most weight is the one that Workload Balancing attempts
to address first. For more information, see Tune metric weightings.
4. Workload Balancing determines which hosts can support the VMs it wants to migrate off hosts.
Workload Balancing makes this determination by calculating the projected effect on resource
utilization of placing different combinations of VMs on hosts. Workload Balancing uses a
method of performing these calculations that in mathematics is known as permutation.
To do so, Workload Balancing creates a single metric or score to forecast the impact of migrating
a VM to the host. The score indicates the suitability of a host as a home for more VMs.
5. After scoring hosts and VMs, Workload Balancing attempts to build virtual models of what the
hosts look like with different combinations of VMs. Workload Balancing uses these models to
determine the best host to place the VM.
In Maximum Performance mode, Workload Balancing uses metric weightings to determine what
hosts to optimize first and what VMs on those hosts to migrate first. Workload Balancing bases
its models on the metric weightings. For example, if CPU utilization is assigned the highest
importance, Workload Balancing sorts hosts and VMs to optimize according to the following
criteria:
a) What hosts are running closest to the High threshold for CPU utilization.
b) What VMs have the highest CPU utilization or are running the closest to its High threshold.
6. Workload Balancing continues calculating optimizations. It views hosts as candidates for opti‑
mization and VMs as candidates for migration until predicted resource utilization on the host
hosting the VM drops below the High threshold. Predicted resource utilization is the resource
utilization that Workload Balancing forecasts a host has after Workload Balancing has added or
removed a VM from the host.
1. When a resource’s utilization drops below its Low threshold, Workload Balancing begins calcu‑
lating potential consolidation scenarios.
2. When Workload Balancing discovers a way that it can consolidate VMs on a host, it evaluates
whether the destination host is a suitable home for the VM.
3. Like in Maximum Performance mode, Workload Balancing scores the host to determine the suit‑
ability of a host as a home for new VMs.
Before Workload Balancing recommends consolidating VMs on fewer hosts, it checks that re‑
source utilization on those hosts after VMs are relocated to them is below Critical thresholds.
Note:
Workload Balancing does not consider metric weightings when it makes a consolidation
recommendation. It only considers metric weightings to ensure performance on hosts.
4. After scoring hosts and VMs, Workload Balancing attempts to build virtual models of what the
hosts look like with different combinations of VMs. It uses these models to determine the best
host to place the VM.
5. Workload Balancing calculates the effect of adding VMs to a host until it forecasts that adding
another VM causes a host resource to exceed the Critical threshold.
6. Workload Balancing recommendations always suggest filling the pool coordinator first since it
is the host that cannot be powered off. However, Workload Balancing applies a buffer to the
pool coordinator so that it cannot be over‑allocated.
7. Workload Balancing continues to recommend migrating VMs on to hosts until all remaining
hosts exceed a Critical threshold when a VM is migrated to them.
You might want to change critical thresholds as a way of controlling when optimization recommenda‑
tions are triggered. This section provides guidance about:
Workload Balancing determines whether to produce recommendations based on whether the aver‑
aged historical utilization for a resource on a host violates its threshold. Workload Balancing recom‑
mendations are triggered when the High threshold in Maximum Performance mode or Low and Criti‑
cal thresholds for Maximum Density mode are violated. For more information, see Optimization and
consolidation process.
After you specify a new Critical threshold for a resource, Workload Balancing resets the other thresh‑
olds of the resource relative to the new Critical threshold. To simplify the user interface, the Critical
threshold is the only threshold you can change through XenCenter.
The following table shows the default values for the Workload Balancing thresholds:
To calculate the threshold values for all metrics except memory, Workload Balancing multiplies the
new value for the Critical threshold with the following factors:
For example, if you increase the Critical threshold for CPU utilization to 95%, Workload Balancing
resets the other thresholds as follows:
• High: 80.75%
• Medium: 47.5%
• Low: 23.75%
To calculate the threshold values for free memory, Workload Balancing multiplies the new value for
the Critical threshold with these factors:
For example, if you increase the Critical threshold for free memory to 45 MB, Workload Balancing
resets the other thresholds as follows:
• High: 56.25 MB
• Medium: 450 MB
• Low: 900 MB
To perform this calculation for a specific threshold, multiply the factor for the threshold with the value
you entered for the critical threshold for that resource:
While the Critical threshold triggers many optimization recommendations, other thresholds can also
trigger optimization recommendations, as follows:
• High threshold.
• Low threshold.
– Maximum Density. When a metric value drops below the Low threshold, Workload Bal‑
ancing determines that hosts are underutilized and makes an optimization recommenda‑
tion to consolidate VMs on fewer hosts. Workload Balancing continues to recommend
moving VMs onto a host until the metric values for one of the host’s resources reaches
its High threshold.
However, after a VM is relocated, utilization of a resource on the VM’s new host can ex‑
ceed a Critical threshold. In this case, Workload Balancing temporarily uses an algorithm
similar to the Maximum Performance load‑balancing algorithm to find a new host for the
VMs. Workload Balancing continues to use this algorithm to recommend moving VMs until
resource utilization on hosts across the pool falls below the High threshold.
4. In the left pane, select Critical Thresholds. These critical thresholds are used to evaluate host
resource utilization.
5. In the Critical Thresholds page, type one or more new values in the Critical Thresholds boxes.
The values represent resource utilization on the host.
Workload Balancing uses these thresholds when making VM placement and pool‑optimization
recommendations. Workload Balancing strives to keep resource utilization on a host below the
critical values set.
How Workload Balancing uses metric weightings when determining which hosts and VMs to process
first varies according to the optimization mode: Maximum Density or Maximum Performance. In gen‑
eral, metric weightings are used when a pool is in Maximum Performance mode. However, when Work‑
load Balancing is in Maximum Density mode, it does use metric weightings when a resource exceeds
its Critical threshold.
For example, if Network Writes is the most important resource, Workload Balancing first makes opti‑
mization recommendations for the host with the highest number of Network Writes per second. To
make Network Writes the most important resource move the Metric Weighting slider to the right and
all the other sliders to the middle.
If you configure all resources to be equally important, Workload Balancing addresses CPU utilization
first and memory second, as these resources are typically the most constrained. To make all resources
equally important, set the Metric Weighting slider is in the same place for all resources.
In Maximum Density mode, Workload Balancing only uses metric weightings when a host reaches the
Critical threshold. At that point, Workload Balancing applies an algorithm similar to the algorithm
for Maximum Performance until no hosts exceed the Critical thresholds. When using this algorithm,
Workload Balancing uses metric weightings to determine the optimization order in the same way as
it does for Maximum Performance mode.
If two or more hosts have resources exceeding their Critical thresholds, Workload Balancing verifies
the importance you set for each resource. It uses this importance to determine which host to optimize
first and which VMs on that host to relocate first.
For example, your pool contains host A and host B, which are in the following state:
• The CPU utilization on host A exceeds its Critical threshold and the metric weighting for CPU
utilization is set to More Important.
• The memory utilization on host B exceeds its Critical threshold and the metric weighting for
memory utilization is set to Less Important.
Workload Balancing recommends optimizing host A first because the resource on it that reached the
Critical threshold is the resource assigned the highest weight. After Workload Balancing determines
that it must address the performance on host A, Workload Balancing then begins recommending
placements for VMs on that host. It begins with the VM that has the highest CPU utilization, since
that CPU utilization is the resource with the highest weight.
After Workload Balancing has recommended optimizing host A, it makes optimization recommenda‑
tions for host B. When it recommends placements for the VMs on host B, it does so by addressing CPU
utilization first, since CPU utilization was assigned the highest weight. If there are more hosts that
need optimization, Workload Balancing addresses the performance on those hosts according to what
host has the third highest CPU utilization.
By default, all metric weightings are set to the farthest point on the slider: More Important.
Note:
The weighting of metrics is relative. If all metrics are set to the same level, even if that level is
Less Important, they are all be weighted the same. The relation of the metrics to each other is
more important than the actual weight at which you set each metric.
5. In Metric Weighting page, as desired, adjust the sliders beside the individual resources.
Move the slider towards Less Important to indicate that ensuring VMs always have the highest
available amount of this resource is not as vital for this pool.
When configuring Workload Balancing, you can specify that specific physical hosts are excluded from
Workload Balancing optimization and placement recommendations, including Start On placement
recommendations.
Situations when you might want to exclude hosts from recommendations include when:
• You want to run the pool in Maximum Density mode and consolidate and shut down hosts, but
you want to exclude specific hosts from this behavior.
• You have two VM workloads that must always run on the same host. For example, if the VMs
have complementary applications or workloads.
• You have workloads that you do not want moved: for example, a domain controller or database
server.
• You want to perform maintenance on a host and you do not want VMs placed on the host.
• The performance of the workload is so critical that the cost of dedicated hardware is irrelevant.
• Specific hosts are running high‑priority workloads, and you do not want to use the HA feature
to prioritize these VMs.
• The hardware in the host is not the optimum for the other workloads in the pool.
Regardless of whether you specify a fixed or scheduled optimization mode, excluded hosts remain
excluded even when the optimization mode changes. Therefore, if you only want to prevent Workload
Balancing from shutting off a host automatically, consider disabling Power Management for that host
instead. For more information, see Optimize and manage power automatically.
When you exclude a host from recommendations, you are specifying for Workload Balancing not to
manage that host at all. This configuration means that Workload Balancing doesn’t make any opti‑
mization recommendations for an excluded host. In contrast, when you don’t select a host to partic‑
ipate in Power Management, Workload Balancing manages the host, but doesn’t make power man‑
agement recommendations for it.
Use this procedure to exclude a host in a pool that Workload Balancing is managing from power man‑
agement, host evacuation, placement, and optimization recommendations.
5. In Excluded Hosts page, select the hosts for which you do not want Workload Balancing to rec‑
ommend alternate placements and optimizations.
Workload Balancing supplies some advanced settings that let you control how Workload Balancing
applies automated recommendations. These settings appear on the Advanced page of the Workload
Balancing Configuration dialog. To get to the Advanced page, complete the following steps:
The following sections describe the behaviors that can be configured in the Advanced settings.
When running in automated mode, the frequency of optimization and consolidation recommenda‑
tions and how soon they are automatically applied is a product of multiple factors, including:
• How long you specify Workload Balancing waits after moving a VM before making another rec‑
ommendation
• The number of recommendations Workload Balancing must make before applying a recommen‑
dation automatically
• The severity level a recommendation must achieve before the optimization is applied automat‑
ically
• The level of consistency in recommendations (recommended VMs to move, destination hosts)
Workload Balancing requires before applying recommendations automatically
In general, only adjust the settings for these factors in the following cases:
Incorrectly configuring these settings can result in Workload Balancing not making any recommenda‑
tions.
VM migration interval
You can specify the number of minutes Workload Balancing waits after the last time a VM was moved,
before Workload Balancing can make another recommendation for that VM. The recommendation
interval is designed to prevent Workload Balancing from generating recommendations for artificial
reasons, for example, if there was a temporary utilization spike.
When automation is configured, it is especially important to be careful when modifying the recom‑
mendation interval. If an issue occurs that leads to continuous, recurring spikes, decreasing the inter‑
val can generate many recommendations and, therefore, relocations.
Note:
Setting a recommendation interval does not affect how long Workload Balancing waits to factor
recently rebalanced hosts into recommendations for Start‑On Placement, Resume, and Mainte‑
nance Mode.
Recommendation count
Every two minutes, Workload Balancing checks to see if it can generate recommendations for the pool
it is monitoring. When you enable automation, you can specify the number of times a consistent rec‑
ommendation must be made before Workload Balancing automatically applies the recommendation.
To do so, you configure a setting known as the Recommendation Count, as specified in the Recom‑
mendations field. The Recommendation Count and the Optimization Aggressiveness setting let
you fine‑tune the automated application of recommendations in your environment.
Workload Balancing uses the similarity of recommendations to make the following checks:
Workload Balancing uses the Recommendation Count value to determine whether a recommendation
must be repeated before Workload Balancing automatically applies the recommendation. Workload
Balancing uses this setting as follows:
1. Every time Workload Balancing generates a recommendation that meets its consistency
requirements, as indicated by the Optimization Aggressiveness setting, Workload Balancing
increments the Recommendation Count. If the recommendation does not meet the consis‑
tency requirements, Workload Balancing might reset the Recommendation Count to zero. This
behavior depends on the factors described in Optimization aggressiveness.
2. When Workload Balancing generates enough consistent recommendations to meet the value
for the Recommendation Count, as specified in the Recommendations field, it automatically
applies the recommendation.
If you choose to modify this setting, the value to set varies according to your environment. Consider
these scenarios:
• If host loads and activity increase rapidly in your environment, you might want to increase value
for the Recommendation Count. Workload Balancing generates recommendations every two
minutes. For example, if you set this interval to 3, then six minutes later Workload Balancing
applies the recommendation automatically.
• If host loads and activity increase gradually in your environment, you might want to decrease
the value for the Recommendation Count.
Accepting recommendations uses system resources and affects performance when Workload Balanc‑
ing is relocating the VMs. Increasing the Recommendation Count increases the number of matching
recommendations that must occur before Workload Balancing applies the recommendation. This set‑
ting encourages Workload Balancing to apply more conservative, stable recommendations and can
decrease the potential for spurious VM moves. The Recommendation Count is set to a conservative
value by default.
Because of the potential impact adjusting this setting can have on your environment, only change
it with extreme caution. Preferably, make these adjustments by testing and iteratively changing the
value or under the guidance of XenServer Technical Support.
Recommendation severity
All optimization recommendations include a severity rating (Critical, High, Medium, Low) that indi‑
cates the importance of the recommendation. Workload Balancing bases this rating on a combination
of factors including the following:
The severity rating for a recommendation appears in the Optimization Recommendations pane on
the WLB tab.
When you configure Workload Balancing to apply recommendations automatically, you can set the
minimum severity level to associate with a recommendation before Workload Balancing automati‑
cally applies it.
Optimization aggressiveness
To provide extra assurance when running in automated mode, Workload Balancing has consistency
criteria for accepting optimizations automatically. This criteria can help to prevent moving VMs due
to spikes and anomalies. In automated mode, Workload Balancing does not accept the first recom‑
mendation it produces. Instead, Workload Balancing waits to apply a recommendation automatically
until a host or VM exhibits consistent behavior over time. Consistent behavior over time includes fac‑
tors like whether a host continues to trigger recommendations and whether the same VMs on that
host continue to trigger recommendations.
Workload Balancing determines if behavior is consistent by using criteria for consistency and by hav‑
ing criteria for the number of times the same recommendation is made. You can configure how strictly
you want Workload Balancing to apply the consistency criteria using the Optimization Aggressive‑
ness setting. You can use this setting to control the amount of stability you want in your environment
before Workload Balancing applies an optimization recommendation. The most stable setting, Low
aggressiveness, is configured by default. In this context, the term stable means the similarity of the
recommended changes over time, as explained throughout this section. Aggressiveness is not desir‑
able in most environments. Therefore, Low is the default setting.
Workload Balancing uses up to four criteria to ascertain consistency. The number of criteria that must
be met varies according to the level you set in the Optimization Aggressiveness setting. The lower
the level (for example, Low or Medium) the less aggressive Workload Balancing is in accepting a rec‑
ommendation. In other words, Workload Balancing is stricter about requiring criteria to match when
aggressiveness is set to Low.
For example, if the aggressiveness level is set to Low, each criterion for Low must be met the number
of times specified by the Recommendation Count value before automatically applying the recommen‑
dation.
If you set the Recommendation Count to 3, Workload Balancing waits until all the criteria listed for
Low are met and repeated in three consecutive recommendations. This setting helps ensure that the
VM actually needs to be moved and that the recommended destination host has stable resource uti‑
lization over a longer period. It reduces the potential for a recently moved VM to be moved off a host
due to host performance changes after the move. By default, this setting is set to Low to encourage
stability.
We do not recommend increasing the Optimization Aggressiveness setting to increase the frequency
with which your hosts are being optimized. If you think that your hosts aren’t being optimized quickly
or frequently enough, try adjusting the Critical thresholds. Compare the thresholds against the Pool
Health report.
The consistency criteria associated with the different levels of aggressiveness is the following:
Low:
• All VMs in subsequent recommendations must be the same (as demonstrated by matching
UUIDs in each recommendation).
• All destination hosts must be the same in subsequent recommendations
• The recommendation that immediately follows the initial recommendation must match or else
the Recommendation Count reverts to 1
Medium:
• All VMs in subsequent recommendations must be from the same host; however, they can be
different VMs from the ones in the first recommendation.
• All destination hosts must be the same in subsequent recommendations
• One of the next two recommendations that immediately follows the first recommendation must
match or else the Recommendation Count reverts to 1
High:
• All VMs in the recommendations must be from the same host. However, the recommendations
do not have to follow each other immediately.
• The host from which Workload Balancing recommended that the VM move must be the same in
each recommendation
• The Recommendation Count remains at the same value even when the two recommendations
that follow the first recommendation do not match
Optimization Aggressiveness example The following example illustrates how Workload Balanc‑
ing uses the Optimization Aggressiveness setting and the Recommendation Count to determine
whether to accept a recommendation automatically.
In the following examples, when the Optimization Aggressiveness setting is set to High, the Rec‑
ommendation Count continues to increase after Recommendation 1, 2, and 3. This increase hap‑
pens even though the same VMs are not recommended for new placements in each recommendation.
Workload Balancing applies the placement recommendation with Recommendation 3 because it has
seen the same behavior from that host for three consecutive recommendations.
In contrast, when set to Low aggressiveness, the consecutive recommendations count does not in‑
crease for the first four recommendations. The Recommendation Count resets to 1 with each recom‑
mendation because the same VMs were not recommended for placements. The Recommendation
Count does not start to increase until the same recommendation is made in Recommendation #5. Fi‑
Recommendation 1:
Proposed placements:
Recommendation counts:
Recommendation 2:
Proposed placements:
Recommendation counts:
Recommendation 3:
Proposed placements:
Recommendation counts:
Recommendation 4:
Proposed placements:
Recommendation counts:
Recommendation 5:
Proposed placements:
Recommendation counts:
Recommendation 6:
Proposed placements:
Recommendation counts:
• In the Minutes box, type a value for the number of minutes Workload Balancing waits be‑
fore making another optimization recommendation on a newly rebalanced host.
• In the Recommendations box, type a value for the number of recommendations you want
Workload Balancing to make before it applies a recommendation automatically.
Note:
If you type “1”for the value in the Recommendations setting, the Optimization Ag‑
gressiveness setting is not relevant.
5. On the Advanced page, click the Pool Audit Trail Report Granularity list, and select an option
from the list.
Important:
Select the granularity based on your audit log requirements. For example, if you set your
audit log report granularity to Minimum, the report only captures limited amount of data
for specific users and object types. If you set the granularity to Medium, the report provides
a user‑friendly report of the audit log. If you choose to set the granularity to Maximum,
the report contains detailed information about the audit log report. Setting the audit log
report to Maximum can cause the Workload Balancing server to use more disk space and
memory.
Follow this procedure to run and view reports of Pool Audit Trail based on the selected object:
1. After you have set the Pool Audit Trail Granularity setting, click Reports. The Workload Reports
page appears.
3. You can run and view the reports based on a specific Object by choosing it from the Object list.
For example, choose Host from the list to get the reports based on host alone.
Customize the event objects and actions captured by the Pool Audit Trail
To customize the event objects and actions captured by the Pool Audit Trail, you must sign in to the
PostgreSQL database on the Workload Balancing virtual appliance, make the relevant changes to the
list of event objects or actions, and then restart the Workload Balancing virtual appliance.
3. Enter the database password. You set the database password when you ran the Workload Bal‑
ancing configuration wizard after you imported the virtual appliance.
Note:
In the command syntax that follows, event_object represents the name of the event object
you want to add, update, or disable.
In the command syntax that follows, event_action represents the name of the event action
you want to add, update, or disable.
Restart the Workload Balancing virtual appliance Run the following commands to quit Post‑
greSQL and restart the Workload Balancing virtual appliance.
1 \q
You can set the alert level for Workload Balancing alerts in XenCenter by using the Management API.
1. Run the following command on the pool coordinator to set the alert level for each alert code:
1 xe pool-send-wlb-configuration config:<wlb-alert-code>=<alert-
level>
2. Run the following command on the pool coordinator to view the alert levels set for the alert
codes:
1 xe pool-retrieve-wlb-configuration
3. To test the alerts, raise a Workload Balancing alert and then click the Notifications panel
to view the alert.
July 8, 2024
After Workload Balancing has been running for a while, there are routine tasks that you might need
to perform to keep Workload Balancing running optimally. You might need to perform these tasks
because of changes to your environment (such as different IP addresses or credentials), hardware
upgrades, or routine maintenance.
After Workload Balancing configuration, connect the pool you want managed to the Workload Balanc‑
ing virtual appliance using either the CLI or XenCenter. Likewise, you might need to reconnect to the
same virtual appliance at some point.
To connect a pool to your Workload Balancing virtual appliance, you need the following informa‑
tion:
– To specify the Workload Balancing FQDN when connecting to the Workload Balancing
server, first add its host name and IP address to your DNS server.
• The port number of the Workload Balancing virtual appliance. By default, XenServer connects
to Workload Balancing on port 8012.
Only edit the port number when you have changed it during Workload Balancing Configuration.
The port number specified during Workload Balancing Configuration, in any firewall rules, and
in the Connect to WLB Server dialog must match.
• Credentials for the resource pool you want Workload Balancing to monitor.
• Credentials for the Workload Balancing account you created during Workload Balancing config‑
uration.
This account is often known as the Workload Balancing user account. XenServer uses this ac‑
count to communicate with Workload Balancing. You created this account on the Workload
Balancing virtual appliance during Workload Balancing Configuration.
When you first connect to Workload Balancing, it uses the default thresholds and settings for balanc‑
ing workloads. Automatic features, such as automated optimization mode, power management, and
automation, are disabled by default.
If you want to upload a different (trusted) certificate or configure certificate verification, note the fol‑
lowing before connecting your pool to Workload Balancing:
• If you want XenServer to verify the self‑signed Workload Balancing certificate, you must use the
Workload Balancing IP address to connect to Workload Balancing. The self‑signed certificate is
issued to Workload Balancing based on its IP address.
• If you want to use a certificate from a certificate authority, it is easier to specify the FQDN when
connecting to Workload Balancing. However, you can specify a static IP address in the Con‑
nect to WLB Server dialog. Use this IP address as the Subject Alternative Name (SAN) in the
certificate.
1. In XenCenter, select your resource pool and in its Properties pane, click the WLB tab. The WLB
tab displays the Connect button.
2. In the WLB tab, click Connect. The Connect to WLB Server dialog box appears.
a) In the Address box, type the IP address or FQDN of the Workload Balancing virtual appli‑
ance. For example, WLB-appliance-computername.yourdomain.net.
b) (Optional) If you changed the Workload Balancing port during Workload Balancing Config‑
uration, enter the port number in the Port box. XenServer uses this port to communicate
with Workload Balancing.
4. In the WLB Server Credentials section, enter the user name and password that the pool uses
to connect to the Workload Balancing virtual appliance.
These credentials must be for the account you created during Workload Balancing configuration.
By default, the user name for this account is wlbuser.
5. In the Citrix Hypervisor Credentials section, enter the user name and password for the pool
you are configuring. Workload Balancing uses these credentials to connect to the hosts in that
pool.
To use the credentials with which you are currently logged into XenServer, select Use the cur‑
rent XenCenter credentials. If you have assigned a role to this account using the role‑based
access control (RBAC) feature, ensure that the role has sufficient permissions to configure Work‑
load Balancing. For more information, see Workload Balancing Access Control Permissions.
After connecting the pool to the Workload Balancing virtual appliance, Workload Balancing automat‑
ically begins monitoring the pool with the default optimization settings. If you want to modify these
settings or change the priority given to resources, wait until the XenCenter Log shows that discovery
is finished before proceeding.
Important:
After Workload Balancing is running for a time, if you do not receive optimal recommendations,
evaluate your performance thresholds as described in Configure Workload Balancing behavior.
It is critical to set Workload Balancing to the correct thresholds for your environment or its rec‑
ommendations might not be appropriate.
When Role Based Access Control (RBAC) is implemented in your environment, all user roles can display
the WLB tab. However, not all roles can perform all operations. The following table lists the minimum
role administrators require to use Workload Balancing features:
Generate WLB Reports, including the Pool Audit View and run WLB reports, including the Pool
Trail report Audit Trail report
Display WLB Configuration View WLB settings for a pool as shown on the
WLB tab
If a user tries to use Workload Balancing and that user doesn’t have sufficient permissions, a role
elevation dialog appears. For more information about RBAC, see Role‑based access control.
You can reconfigure a resource pool to use a different Workload Balancing virtual appliance.
If you are moving from an older version of the Workload Balancing virtual appliance to the latest ver‑
sion, before disconnecting your old virtual appliance, you can migrate its data to the new version of
the virtual appliance. For more information, see Migrate data from an existing virtual appliance.
After disconnecting a pool from the old Workload Balancing virtual appliance, you can connect the
pool by specifying the name of the new Workload Balancing virtual appliance.
1. (Optional) Migrate data from an older version of the virtual appliance. For more information,
see Migrate data from an existing virtual appliance.
2. In XenCenter, from the Pool menu, select Disconnect Workload Balancing Server and click
Disconnect when prompted.
3. In the WLB tab, click Connect. The Connect to WLB Server dialog appears.
4. Connect to the new virtual appliance. For more information, see Connect to the Workload Bal‑
ancing virtual appliance
After initial configuration, if you want to update the credentials XenServer and the Workload Balancing
appliance use to communicate, use the following process:
2. Change the Workload Balancing credentials by running the wlbconfig command. For more
information, see Workload Balancing Commands.
• In the Address box, type the IP address or FQDN of the Workload Balancing appliance.
• (Optional) If you changed the port number during Workload Balancing Configuration, en‑
ter that port number. The port number you specify in this box and during Workload Balanc‑
ing Configuration is the port number XenServer uses to connect to Workload Balancing.
Note:
Only edit this port number if you changed it when you ran the Workload Balancing
Configuration wizard. The port number value specified when you ran the Workload
Balancing Configuration wizard and the Connect to WLB Server dialog must match.
7. In the WLB Server Credentials section, enter the user name (for example, wlbuser) and pass‑
word the computers running XenServer uses to connect to the Workload Balancing server.
8. In the Citrix Hypervisor Credentials section, enter the user name and password for the pool
you are configuring (typically the password for the pool coordinator). Workload Balancing uses
these credentials to connect to the computers running XenServer in that pool.
9. In the Citrix Hypervisor Credentials section, enter the user name and password for the pool
you are configuring. Workload Balancing uses these credentials to connect to the computers
running XenServer in that pool.
To use the credentials with which you are currently logged into XenServer, select Use the cur‑
rent XenCenter credentials.
1. To view the current Workload Balancing IP address, run the ifconfig command on the virtual
appliance.
4. At the bottom of the file, set the IP address, netmask, gateway, and DNS addresses. For example:
1 IPADDR=192.168.1.100
2 NETMASK=255.255.255.0
3 GATEWAY=192.168.1.1
4 DNS1=1.1.1.1
5 DNS2=8.8.8.8
Note:
When you first install the Workload Balancing virtual appliance it has the following default configura‑
tion:
Configuration Value
Number of vCPUs 2
Memory (RAM) 2 GB
Disk space 30 GB
These values are suitable for most environments. If you are monitoring very large pools, you might
consider increasing these values.
By default, the Workload Balancing virtual appliance is assigned 2 vCPUs. This value is sufficient for
pools hosting 1000 VMs. You do not usually need to increase it. Only decrease the number of vCPUs
This procedure explains how to change the number of vCPUs assigned to the Workload Balancing vir‑
tual appliance. Shut down the virtual appliance before performing these steps. Workload Balancing
is unavailable for approximately five minutes.
2. In the XenCenter resource pane, select the Workload Balancing virtual appliance.
3. In the virtual appliance General tab, click Properties. The Properties dialog opens.
4. In the CPU tab of the Properties dialog, edit the CPU settings to the required values.
5. Click OK.
The new vCPU settings take affect when the virtual appliance starts.
For large pools, set the Workload Balancing virtual appliance to consume the maximum amount of
memory you can make available to it (even up to 16 GB). Do not be concerned about high memory
utilization. High memory utilization is normal for the virtual appliance because the database always
consumes as much memory as it can obtain.
Note:
Dynamic Memory Control is not supported with the Workload Balancing virtual appliance. Set a
fixed value for the maximum memory to assign to the virtual appliance.
This procedure explains how to resize the memory of the Workload Balancing virtual appliance. Shut
down the virtual appliance before performing these steps. Workload Balancing is unavailable for ap‑
proximately five minutes.
2. In the XenCenter resource pane, select the Workload Balancing virtual appliance.
3. In the virtual appliance Memory tab, click Edit. The Memory Settings dialog opens.
5. Click OK.
The new memory settings take affect when the virtual appliance starts.
Warning:
You can only extend the available disk space in versions 8.3.0 and later as LVM is not supported
before 8.3.0.
Workload Balancing does not support decreasing the available disk space.
The greater the number of VMs the Workload Balancing virtual appliance is monitoring, the more disk
space it consumes per day.
You can estimate the amount of disk size that the virtual appliance needs by using the following for‑
mula:
• average disk usage depends on the number of VMs being monitored. The following values give
an approximation for certain numbers of VMs:
• grooming multiplier is 1.25. This multiplier accounts for the amount of disk space required by
grooming. It assumes that grooming requires an additional 25% of the total calculated disk
space.
For versions 8.2.2 and earlier This procedure explains how to extend the virtual disk of the Work‑
load Balancing virtual appliance for Workload Balancing versions 8.2.2 and earlier.
Warning:
We recommend taking a snapshot of your data before performing this procedure. Incorrectly
performing these steps can result in corrupting the Workload Balancing virtual appliance.
2. In the XenCenter resource pane, select the Workload Balancing virtual appliance.
1 resize2fs /dev/xvda
Installing resize2fs If the resize2fs tool is not installed on the Workload Balancing virtual
appliance, you can install it by using the following steps.
If you are connected to the internet, run the following command on the Workload Balancing virtual
appliance:
• libss-1.42.9-7.el7.i686.rpm
• e2fsprogs-libs-1.42.9-7.el7.x86_64.rpm
• e2fsprogs-1.42.9-7.el7.x86_64.rpm
2. Upload them to Workload Balancing VM using SCP or any other suitable tool.
For versions 8.3.0 and later This procedure explains how to extend the virtual disk of the Work‑
load Balancing virtual appliance for Workload Balancing versions 8.3.0 and later, using Linux Volume
Manager (LVM).
Warning:
This procedure must only be followed by Experienced Linux System Administrators as incorrectly
performing these steps can result in corrupting the Workload Balancing virtual appliance. We
cannot guarantee that problems resulting from the incorrect use of the Registry Editor can be
solved. Be sure to back up the registry before you edit it and shut down the virtual appliance be‑
fore performing these steps. Workload Balancing is unavailable for approximately five minutes.
To create new partitions, manipulate Physical Volumes and change your Filesystem size, perform the
following actions while logged in as a Super User (root):
1 fdisk -l
1 parted <disk>
1 parted /dev/xvda
3. Enter p.
If the following error messages occur, enter Fix to resolve each one:
• “Error: The backup GPT table is not at the end of the disk, as it should be. This might mean
that another operating system believes the disk is smaller. Fix, by moving the backup to
the end (and removing the old backup)?”
• “Warning: Not all of the space available to <disk> appears to be used, you can fix the GPT
To use all of the space (an extra <block number> blocks) or continue with the current
setting?”
1 fdisk <disk>
1 fdisk /dev/xvda
6. Type n and press Enter to create a new partition, type p and press Enter to make it a primary
partition, and press Enter to use the default which is the next available partition (in this case,
as stated above, it’ll be partition number 3).
Note:
If no additional space has been allocated yet, you will see a message indicating that there
are no free sectors available. Type q and press Enter to quit fdisk. Allocate the desired
space via XenCenter first and then come back to this step.
7. Press Enter twice to use the default first and last sectors of the available partition (or manually
indicate the desired sectors). Type t to specify a partition type, choose the desired partition (in
this case 3), type 8e, and press Enter to make it an LVM type partition.
Example output:
8. Type p and press Enter to print the details of the partition. The output should look similar to
the one below (note that the start and end blocks values might vary depending on the amount
of space you’ve allocated):
9. If something is incorrect, type q and press Enter to exit without saving and to prevent your
existing partitions from being affected. Start again from step 1. Otherwise, if all looks well, type
w and press Enter instead in order to write the changes.
After writing these changes, you might get a warning indicating that the device was busy and
the kernel is still using the old table. If that’s the case, run this command which will refresh the
partition table, before proceeding with the next step: partprobe.
Make sure the new device partition (in this case /dev/xvda4) is listed now. To do so, run:
fdisk -l.
For example:
1 pvcreate /dev/xvda4
11. Check that the Physical Volume created above is now listed:
1 pvs
In this example, the additional space added was 12G. Example output:
12. Based on the output of the previous command, the Volume Group named centos must be ex‑
tended:
For example:
1 vgs
1 pvscan
This should show /dev/xvda4 as part of the centos Volume group. Example output:
15. If the information shown in the previous steps looks correct, run this command to see the Logic
Volume path for the Logical Volume to be extended:
1 lvdisplay
16. Run the following command to view the free PE/size (this tells you the exact value to use when
extending the partition):
1 vgdisplay
Example output:
17. Using the free PE/size value and the Logic Volume path outputted in step 11, extend the Logic
Volume:
1 resize2fs /dev/centos/root
Example output:
1 df -h /*
If you’re seeing the expected numbers, you have successfully allocated the desired space and correctly
extended the partition. For further assistance, please contact XenServer Support.
Because Workload Balancing is configured at the pool level, when you want it to stop managing a
pool, you must do one of the following:
Pause Workload Balancing. Pausing Workload Balancing stops XenCenter from displaying recom‑
mendations for the specified resource pool and managing the pool. Pausing is designed for a short
period and lets you resume monitoring without having to reconfigure. When you pause Workload
Balancing, data collection stops for that resource pool until you enable Workload Balancing again.
1. In XenCenter, select the resource pool for which you want to disable Workload Balancing.
2. In the WLB tab, click Pause. A message appears on the WLB tab indicating that Workload Bal‑
ancing is paused.
Tip:
Disconnect the pool from Workload Balancing. Disconnecting from the Workload Balancing virtual
appliance breaks the connection between the pool and if possible, deletes the pool data from the
Workload Balancing database. When you disconnect from Workload Balancing, Workload Balancing
stops collecting data on the pool.
1. In XenCenter, select the resource pool on which you want to stop Workload Balancing.
2. From the Infrastructure menu, select Disconnect Workload Balancing Server. The Discon‑
nect Workload Balancing server dialog box appears.
3. Click Disconnect to stop Workload Balancing from monitoring the pool permanently.
Tip:
If you disconnected the pool from the Workload Balancing virtual appliance, to re‑enable Work‑
load Balancing on that pool, you must reconnect to a Workload Balancing appliance. For infor‑
mation, see the Connect to the Workload Balancing Virtual Appliance.
With Workload Balancing enabled, if you put a host in maintenance mode, XenServer migrates the
VMs running on that host to their optimal hosts when available. XenServer uses Workload Balancing
recommendations that are based on performance data, your placement strategy, and performance
thresholds to select the optimal host.
If an optimal host is not available, the words Click here to suspend the VM appear in the Enter Main‑
tenance Mode wizard. In this case, because there is not a host with sufficient resources to run the
VM, Workload Balancing does not recommend a placement. You can either suspend this VM or exit
maintenance mode and suspend a VM on another host in the same pool. Then, if you reenter the En‑
ter Maintenance Mode dialog box, Workload Balancing might be able to list a host that is a suitable
candidate for migration.
Note:
When you take a host offline for maintenance and Workload Balancing is enabled, the words
“Workload Balancing”appear in the Enter Maintenance Mode wizard.
1. In the Resources pane of XenCenter, select the physical server that you want to take off‑line.
The VMs running on the host are automatically migrated to the optimal host based on the Work‑
load Balancing performance data, your placement strategy, and performance thresholds.
When you remove a host from maintenance mode, XenServer automatically restores that host’
s original VMs to that host.
To remove the Workload Balancing virtual appliance, we recommend you use the standard procedure
to delete VMs from XenCenter.
When you delete the Workload Balancing virtual appliance, the PostgreSQL database containing the
Workload Balancing is deleted. To save this data, you must migrate it from the database before delet‑
ing the Workload Balancing virtual appliance.
The following information is intended for database administrators and advanced users of PostgreSQL
who are comfortable with database administration tasks. If you are not experienced with PostgreSQL,
we recommend that you become familiar with it before you attempt the database tasks in the sections
that follow.
By default, the PostgreSQL user name is postgres. You set the password for this account during
Workload Balancing configuration.
The amount of historical data you can store is based on the size of the virtual disk allocated to Work‑
load Balancing and the minimum required space. By default, the size of the virtual disk allocated to
Workload Balancing is 30 GB. In terms of managing the database, you can control the space that data‑
base data consumes by configuring database grooming. For more information, see Database groom‑
ing parameters.
To store a lot of historical data, for example if you want to enable the Pool Audit trail Report, you can
do either of the following:
• Make the virtual disk size assigned to the Workload Balancing virtual appliance larger. To do so,
import the virtual appliance, and increase the size of the virtual disk by following the steps in
Extend the virtual appliance disk.
• Create periodic duplicate backup copies of the data by enabling remote client access to the
database and using a third‑party database administration tool.
The Workload Balancing virtual appliance has firewall configured in it. Before you can access the data‑
base, you must add the postgresQL server port to the iptables.
1. From the Workload Balancing virtual appliance console, run the following command:
2. (Optional) To make this configuration persist after the virtual appliance is rebooted, run the
following command:
The Workload Balancing database automatically deletes the oldest data whenever the virtual appli‑
ance reaches the minimum amount of disk space that Workload Balancing requires to run. By default,
the minimum amount of required disk space is set to 1,024 MB.
The Workload Balancing database grooming options are controlled through the file wlb.conf.
When there is not enough disk space left on the Workload Balancing virtual appliance, Workload Bal‑
ancing automatically starts grooming historical data. The process is as follows:
You can change the grooming interval if desired using GroomingIntervalInHour. How‑
ever, by default Workload Balancing checks to see if grooming is required once per hour.
2. If grooming is required, Workload Balancing begins by grooming the data from the oldest day.
Workload Balancing then checks to see if there is now enough disk space for it to meet the min‑
imum disk‑space requirement.
3. If the first grooming did not free enough disk space, then Workload Balancing repeats grooming
up to GroomingRetryCounter times without waiting for GroomingIntervalInHour
hour.
4. If the first or repeated grooming freed enough disk space, then Workload Balancing waits for
GroomingIntervalInHour hour and returns to Step 1.
5. If the grooming initiated by the GroomingRetryCounter did not free enough disk space,
then Workload Balancing waits for GroomingIntervalInHour hour and returns to Step 1.
There are five parameters in the wlb.conf file that control various aspects of database grooming.
They are as follows:
• GroomingIntervalInHour. Controls how many hours elapse before the next grooming
check is done. For example, if you enter 1, Workload Balancing checks the disk space hourly. If
you enter 2, Workload Balancing checks disk space every two hours to determine if grooming
must occur.
To edit these values, see Edit the Workload Balancing configuration file.
We recommend using the wlbconfig command to change the database password. For more infor‑
mation, see Modify the Workload Balancing configuration options. Do not change the password by
modifying the wlb.conf file.
To avoid having older historical data deleted, you can, optionally, copy data from the database for
archiving. To do so, you must perform the following tasks:
2. Set up archiving using the PostgreSQL database administration tool of your choice.
While you can connect directly to the database through the Workload Balancing console, you can also
use a PostgreSQL database management tool. After downloading a database management tool, in‑
stall it on the system from which you want to connect to the database. For example, you can install
the tool on the same laptop where you run XenCenter.
Before you can enable remote client authentication to the database, you must:
1. Modify the database configuration files, including pg_hba.conf file and the postgresql.conf, to
allow connections.
2. Stop the Workload Balancing services, restart the database, and then restart the Workload Bal‑
ancing services.
3. In the database management tool, configure the IP address of the database (that is, the IP ad‑
dress of the Workload Balancing virtual appliance) and the database password.
To enable client authentication on the database, you must modify the following files on the Workload
Balancing virtual appliance: the pg_hba.conf file and the postgresql.conf file.
To edit the pg_hba.conf file:
1. Modify the pg_hba.conf file. From the Workload Balancing virtual appliance console, open
the pg_hba.conf file with an editor, such as VI. For example:
1 vi /var/lib/pgsql/9.0/data/pg_hba.conf
2. If your network uses IPv4, add the IP address from the connecting computer to this file. For
example:
In the configuration section, enter the following under #IPv4 local connections:
• TYPE: host
• DATABASE: all
• USER: all
• CIDR‑ADDRESS: 0.0.0.0/0
• METHOD: trust
Instead of entering 0.0.0.0/0, you can enter your IP address and replace the last three digits
with 0/24. The trailing “24”after the / defines the subnet mask and only allows connections
When you enter trust for the Method field, it enables the connection to authenticate without
requiring a password. If you enter password for the Method field, you must supply a pass‑
word when connecting to the database.
4. If your network uses IPv6, add the IP address from the connecting computer to this file. For
example:
Enter the following under #IPv6 local connections:
• TYPE: host
• DATABASE: all
• USER: all
• CIDR‑ADDRESS: ::0/0
• METHOD: trust
Enter the IPv6 addresses in the CIDR-ADDRESS field. In this example, the ::0/0 opens the
database up to connections from any IPv6 addresses.
5. Save the file and quit the editor.
6. After changing any database configurations, you must restart the database to apply the changes.
Run the following command:
1. Modify the postgresql.conf file. From the Workload Balancing virtual appliance console,
open the postgresql.conf file with an editor, such as VI. For example:
1 vi /var/lib/pgsql/9.0/data/postgresql.conf
2. Edit the file so that it listens on any port and not just the local host. For example:
1 # listen_addresses='localhost'
b) Remove the comment symbol (#) and edit the line to read as follows:
1 listen_addresses='*'
Workload Balancing automatically performs routine database maintenance daily at 12:05AM GMT
(00:05), by default. During this maintenance window, data collection occurs but the recording of data
might be delayed. However, the Workload Balancing user interface controls are available during this
period and Workload Balancing still makes optimization recommendations.
Note:
• During the maintenance window, the Workload Balancing server restarts. Ensure that you
do not restart your VMs at the same time.
• At other times, when restarting all VMs in your pool, do not restart the Workload Balancing
server.
Database maintenance includes releasing allocated unused disk space and reindexing the database.
Maintenance lasts for approximately 6 to 8 minutes. In larger pools, maintenance might last longer,
depending on how long Workload Balancing takes to perform discovery.
Depending on your time zone, you might want to change the time when maintenance occurs. For
example, in the Japan Standard Time (JST) time zone, Workload Balancing maintenance occurs at
9:05 AM (09:05), which can conflict with peak usage in some organizations. If you want to specify a
seasonal time change, such as Daylight Saving Time or summer time, you must build the change into
value you enter.
1. In the Workload Balancing console, run the following command from any directory:
1 crontab -e
1 05 0 * * * /opt/vpx/wlb/wlbmaintenance.sh
The value 05 0 represents the default time for Workload Balancing to perform maintenance
in minutes (05) and then hours (0). (The asterisks represent the day, month, and year the job
runs: Do not edit these fields.) The entry 05 0 indicates that database maintenance occurs
at 12:05 AM, or 00:05, Greenwich Mean Time (GMT) every night. This setting means that if you
live in New York, the maintenance runs at 7:05 PM (19:05) during winter months and 8:05 PM in
summer months.
Important:
Do not edit the day, month, and year the job runs (as represented by asterisks). Database
• Command lines for scripting. For more information, see Workload Balancing commands.
• Host Power On scripting support. You can also customize Workload Balancing (indirectly)
through the Host Power On scripting. For more information, see Hosts and resource pools.
Online upgrading of Workload Balancing has been deprecated for security reasons. Customers cannot
upgrade by using the yum repo anymore. Customers can upgrade Workload Balancing to the latest
version by importing the latest Workload Balancing virtual appliance downloadable at the XenServer
Downloads page.
This section provides a reference for the Workload Balancing commands. You can perform these
commands from the XenServer host or console to control Workload Balancing or configure Workload
Balancing settings on the XenServer host. This appendix includes xe commands and service com‑
mands.
Run the following service commands on the Workload Balancing appliance. To do so, you must log in
to the Workload Balancing virtual appliance.
Before you can run any service commands or edit the wlb.conf file, you must log in to the Work‑
load Balancing virtual appliance. To do so, you must enter a user name and password. Unless you
created extra user accounts on the virtual appliance, log in using the root user account. You speci‑
fied this account when you ran Workload Balancing Configuration wizard (before you connected your
pool to Workload Balancing). You can, optionally, use the Console tab in XenCenter to log in to the
appliance.
To log off from the Workload Balancing virtual appliance, simply type logout at the com‑
mand prompt.
wlb restart
Run the wlb restart command from anywhere in the Workload Balancing appliance to stop and
then restart the Workload Balancing Data Collection, Web Service, and Data Analysis services.
wlb start
Run the wlb start command from anywhere in the Workload Balancing appliance to start the
Workload Balancing Data Collection, Web Service, and Data Analysis services.
wlb stop
Run the wlb stop command from anywhere in the Workload Balancing appliance to stop the Work‑
load Balancing Data Collection, Web Service, and Data Analysis services.
wlb status
Run the wlb status command from anywhere in the Workload Balancing appliance to determine
the status of the Workload Balancing server. After you run this command, the status of the three
Workload Balancing services (the Web Service, Data Collection Service, and Data Analysis Service) is
displayed.
Many Workload Balancing configurations, such as the database and web‑service configuration op‑
tions, are stored in the wlb.conf file. The wlb.conf file is a configuration file on the Workload
Balancing virtual appliance.
To modify the most commonly used options, use the command wlb config. Running the wlb
config command on the Workload Balancing virtual appliance lets you rename the Workload Bal‑
ancing user account, change its password, or change the PostgreSQL password. After you run this
command, the Workload Balancing services are restarted.
1 wlb config
The screen displays a series of questions guiding you through changing your Workload Balancing user
name and password and the PostgreSQL password. Follow the questions on the screen to change
these items.
Important:
Double‑check any values you enter in the wlb.conf file: Workload Balancing does not vali‑
date values in the wlb.conf file. Therefore, if the configuration parameters you specify are not
within the required range, Workload Balancing does not generate an error log.
You can modify Workload Balancing configuration options by editing the wlb.conf file, which is
stored in /opt/vpx/wlb directory on the Workload Balancing virtual appliance. In general, only
change the settings in this file with guidance from XenServer. However, there are three categories of
settings you can change if desired:
• Workload Balancing account name and password. It is easier to modify these credentials by
running the wlb config command.
• Database password. This value can be modified using the wlb.conf file. However, we rec‑
ommend modifying it through the wlb config command since this command modifies the
wlb.conf file and automatically updates the password in the database. If you choose to modify
the wlb.conf file instead, you must run a query to update the database with the new password.
• Database grooming parameters. You can modify database grooming parameters, such as the
database grooming interval, using this file by following the instructions in the database man‑
agement section. However, if you do so, we recommend using caution.
For all other settings in the wlb.conf file, we recommend leaving them at their default, unless you
have been instructed to modify them.
1. Run the following from the command prompt on the Workload Balancing virtual appliance (us‑
ing VI as an example):
1 vi /opt/vpx/wlb/wlb.conf
You do not need to restart Workload Balancing services after editing the wlb.conf file. The changes
go into effect immediately after exiting the editor.
Important:
Double‑check any values you enter in the wlb.conf file: Workload Balancing does not vali‑
date values in the wlb.conf file. Therefore, if the configuration parameters you specify are not
within the required range, Workload Balancing does not generate an error log.
The Workload Balancing log provides a list of events on the Workload Balancing virtual appliance,
including actions for the analysis engine, database, and audit log. This log file is found in this location:
/var/log/wlb/LogFile.log.
You can, if desired, increase the level of detail the Workload Balancing log provides. To do so, modify
the Trace flags section of the Workload Balancing configuration file (wlb.conf), which is found
in the following location: /opt/vpx/wlb/wlb.conf. Enter a 1 or true to enable logging for a spe‑
cific trace and a 0 or false to disable logging. For example, to enable logging for the Analysis Engine
trace, enter:
1 AnalEngTrace=1
You might want to increase logging detail before reporting an issue to XenServer Technical Support
or when troubleshooting.
XenServer and Workload Balancing communicate over HTTPS. During Workload Balancing Configu‑
ration, the wizard automatically creates a self‑signed test certificate. This self‑signed test certificate
lets Workload Balancing establish a TLS connection to XenServer. By default, Workload Balancing
creates this TLS connection with XenServer automatically. You do not need to perform any certificate
configurations during or after configuration for Workload Balancing to create this TLS connection.
Note:
The self‑signed certificate is a placeholder to facilitate HTTPS communication and is not from a
trusted certificate authority. For added security, we recommend using a certificate signed from
a trusted certificate authority.
To use a certificate from another certificate authority, such as a signed one from a commercial author‑
ity, you must configure Workload Balancing and XenServer to use it.
By default, XenServer does not validate the identity of the certificate before it establishes connection
to Workload Balancing. To configure XenServer to check for a specific certificate, export the root cer‑
tificate that was used to sign the certificate. Copy the certificate to XenServer and configure XenServer
to check for it when a connection to Workload Balancing is made. XenServer acts as the client in this
scenario and Workload Balancing acts as the server.
Note:
For certificate verification to succeed, you must store the certificates in the specific locations in
which XenServer expects to find the certificates.
You can configure XenServer to verify that the XenServer Workload Balancing self‑signed certificate is
authentic before XenServer permits Workload Balancing to connect.
Important:
To verify the XenServer Workload Balancing self‑signed certificate, you must connect to
Workload Balancing using its host name. To find the Workload Balancing host name, run the
hostname command on the virtual appliance.
To configure XenServer to verify the self‑signed certificate, complete the following steps:
1. Copy the self‑signed certificate from the Workload Balancing virtual appliance to the pool co‑
ordinator. The XenServer Workload Balancing self‑signed certificate is stored at /etc/ssl/
certs/server.pem. Run the following command on the pool coordinator:
1 scp root@<wlb-ip>:/etc/ssl/certs/server.pem .
2. If you receive a message stating that the authenticity of wlb-ip cannot be established, type
yes to continue.
3. Enter Workload Balancing virtual appliance root password when prompted. The certificate is
copied to the current directory.
4. Install the certificate. Run the following command in the directory where you copied the certifi‑
cate:
1 xe pool-certificate-install filename=server.pem
5. Verify the certificate was installed correctly by running the following command on the pool co‑
ordinator:
1 xe pool-certificate-list
If you installed the certificate correctly, the output of this command includes the exported root
certificate. Running this command lists all installed TLS certificates, including the certificate
you installed.
6. To synchronize the certificate from the coordinator to all hosts in the pool, running the following
command on the pool coordinator:
1 xe pool-certificate-sync
There is no output from this command. However, the next step does not work if this one did not
work successfully.
7. Instruct XenServer to verify the certificate before connecting to the Workload Balancing virtual
appliance. Run the following command on the pool coordinator:
Tip:
Pressing the Tab key automatically populates the UUID of the pool.
8. (Optional) To verify this procedure worked successfully, perform the following steps:
a) To test if the certificate synchronized to the other hosts in the pool, run the pool-
certificate-list command on those hosts.
b) To test if XenServer was set to verify the certificate, run the pool-param-get command
with the param-name=wlb‑verify‑cert parameter. For example:
You can configure XenServer to verify a certificate signed by a trusted certificate authority.
For trusted authority certificates, XenServer requires an exported certificate or certificate chain (the
intermediate and root certificates) in .pem format that contains the public key.
If you want Workload Balancing to use a trusted authority certificate, do the following tasks:
• XenServer can resolve the Workload Balancing host name. (For example, you can try pinging
the Workload Balancing FQDN from the XenServer console for the pool coordinator.)
To obtain a certificate from a certificate authority, you must generate a Certificate Signing Request
(CSR). On the Workload Balancing virtual appliance, create a private key and use that private key to
generate the CSR.
Guidelines for specifying the Common Name The Common Name (CN) you specify when creating
a CSR must exactly match the FQDN of your Workload Balancing virtual appliance. It must also match
the FQDN or IP address you specified in the Address box in the Connect to WLB Server dialog box.
To ensure the name matches, specify the Common Name using one of these guidelines:
• Specify the same information for the certificate’s Common Name as you specified in the Con‑
nect to WLB Server dialog.
• If you connected your pool to Workload Balancing by IP address, use the FQDN as the Common
Name and the IP address as a Subject Alternative Name (SAN). However, this approach might
not work in all situations.
Create a private key file On the Workload Balancing virtual appliance, complete the following
steps:
Note:
If you enter the password incorrectly or inconsistently, you might receive some messages indi‑
cating that there is a user interface error. You can ignore the message and rerun the command
to create the private key file.
Generate the Certificate Signing Request On the Workload Balancing virtual appliance, complete
the following steps:
1. Create the Certificate Signing Request (CSR) using the private key:
2. Follow the prompts to provide the information necessary to generate the CSR:
Country Name. Enter the TLS Certificate country codes for your country. For example, CA for
Canada or JM for Jamaica. You can find a list of TLS Certificate country codes on the web.
State or Province Name (full name). Enter the state or province where the pool is located. For
example, Massachusetts or Alberta.
Locality Name. The name of the city where the pool is located.
Organizational Unit Name. Enter the department name. This field is optional.
Common Name. Enter the FQDN of your Workload Balancing server. This value must match the
name the pool uses to connect to Workload Balancing. For more information, see Guidelines
for specifying the Common Name.
Email Address. This email address is included in the certificate when you generate it.
The CSR request is saved in the current directory and is named csr.
4. Display the CSR in the console window by running the following commands in the Workload
Balancing appliance console:
1 cat csr
5. Copy the entire CSR and use it to request the certificate from the certificate authority.
Use this procedure to specify Workload Balancing use a certificate from a certificate authority. This
procedure installs the root and (if available) intermediate certificates.
1. Download the signed certificate, root certificate and, if the certificate authority has one, the
intermediate certificate from the certificate authority.
2. If you didn’t download the certificates directly to the Workload Balancing virtual appliance,
copy them across by using one of the following methods:
For the host name, you can enter the IP address and leave the port at the default. The user
name and password are typically root and whatever password you set during configura‑
tion.
• From a Linux computer to the Workload Balancing appliance, use SCP or another copying
utility. For example:
3. On the Workload Balancing virtual appliance, merge the contents of all the certificates (root
certificate, intermediate certificate ‑ if it exists, and signed certificate) into one file. You can use
the following command:
4. Rename the existing certificate and key by using the move command:
1 mv /etc/ssl/certs/server.pem /etc/ssl/certs/server.pem_orig
2 mv /etc/ssl/certs/server.key /etc/ssl/certs/server.key_orig
1 mv server.pem /etc/ssl/certs/server.pem
1 mv privatekey.nop.pem /etc/ssl/certs/server.key
7. Make the private key readable only by root. Use the chmod command to fix permissions.
8. Restart stunnel:
1 killall stunnel
2 stunnel
After you obtain the certificates, import them onto the XenServer pool coordinator. Synchronize the
hosts in the pool to use those certificates. Then you can configure XenServer to check the certificate
identity and validity each time Workload Balancing connects to a host.
1. Copy the signed certificate, root certificate and, if the certificate authority has one, the interme‑
diate certificate from the certificate authority onto the XenServer pool coordinator.
2. Install the root certificate on the pool coordinator:
1 xe pool-install-ca-certificate filename=root_ca.pem
1 xe pool-install-ca-certificate filename=intermediate_ca.pem
4. Verify both the certificates installed correctly by running this command on the pool coordinator:
1 xe pool-certificate-list
Running this command lists all installed TLS certificates. If the certificates installed successfully,
they appear in this list.
5. Synchronize the certificate on the pool coordinator to all hosts in the pool:
1 xe pool-certificate-sync
Tip:
Pressing the Tab key automatically populates the UUID of the pool.
7. If you specified an IP address in the Connect to WLB dialog before you enabled certificate veri‑
fication, you might be prompted to reconnect the pool to Workload Balancing.
Specify the FQDN for the Workload Balancing appliance in Address in the Connect to WLB dia‑
log exactly as it appears in the certificate’s Common Name. Enter the FQDN to ensure that the
Common Name matches the name that XenServer uses to connect.
Troubleshooting
• If the pool cannot connect to Workload Balancing after configuring certificate verification, check
to see if the pool can connect if you turn certificate verification off. You can use the command xe
pool-param-set wlb-verify-cert=false uuid=uuid_of_pool to disable cer‑
tificate verification. If it can connect with verification off, the issue is in your certificate config‑
uration. If it cannot connect, the issue is in either your Workload Balancing credentials or your
network connection.
• Some commercial certificate authorities provide tools to verify the certificate installed correctly.
Consider running these tools if these procedures fail to help isolate the issue. If these tools re‑
quire specifying a TLS port, specify port 8012 or whatever port you set during Workload Balanc‑
ing Configuration.
• If the WLB tab shows a connection error, there might be a conflict between the certificate Com‑
mon Name and the name of the Workload Balancing virtual appliance. The Workload Balancing
virtual appliance name and the Common Name of the certificate must match exactly.
• Workload Balancing is available for XenServer Premium Edition customers. For more infor‑
mation about XenServer licensing, see Licensing. To upgrade, or to get a XenServer license,
Run the systemctl status workloadbalancing command. For more information, see
Workload Balancing commands.
• Start troubleshooting by reviewing the Workload Balancing log files (LogFile.log and
wlb_install_log.log). You can find these logs in Workload Balancing virtual appliance
in this location (by default):
/var/log/wlb
The level of detail in these log files can be configured by using the wlb.conf file. For more
information, see Increase the detail in the Workload Balancing log.
• Check the logs in the XenCenter Logs tab for further information.
• To check the Workload Balancing virtual appliance build number, run the following command
on a host in a pool that the virtual appliance monitors:
1 xe pool-retrieve-wlb-diagnostics | more
The Workload Balancing version number appears at the top of the output.
• The Workload Balancing virtual appliance is based on the CentOS operating system. If you ex‑
perience CPU, memory, or disk related issues in the virtual appliance, you can use the standard
Linux logs in /var/log/* to analyse the issue.
• Use standard Linux debugging and performance tuning commands to understand the virtual
appliance behavior. For example, top, ps, free, sar, and netstat.
Error messages
Workload Balancing displays errors on screen as dialog boxes and as error messages in the Logs tab
in XenCenter.
If an error message appears, review the XenCenter event log for additional information. For more
information, see the XenCenter product documentation.
If you cannot successfully enter the virtual appliance user account and password while configuring
the Connect to WLB Server dialog, try the following:
• Ensure that Workload Balancing virtual appliance imported and was configured correctly and
all of its services are running.
• Check to ensure that you are entering the correct credentials. The Connect to WLB Server
dialog asks for two different credentials:
– WLB Server Credentials: XenServer uses this account to communicate with Workload
Balancing. You created this account on the Workload Balancing virtual appliance during
Workload Balancing Configuration. By default, the user name for this account is wlbuser
.
– Citrix Hypervisor Credentials: This account is used by the Workload Balancing virtual
appliance to connect to the XenServer pool. This account is created on the XenServer pool
coordinator and has the pool-admin or pool-operator role.
• You can enter a host name in the Address box, but it must be the fully qualified domain name
(FQDN) of the Workload Balancing virtual appliance. Do not enter the host name of the physical
server hosting the appliance. If you are having trouble entering a computer name, try using the
Workload Balancing appliance’s IP address instead.
• Verify that the host is using the correct DNS server and the XenServer host can contact Work‑
load Balancing server using its FQDN. To do this check, ping the Workload Balancing appliance
using its FQDN from the XenServer host. For example, enter the following in the XenServer host
console:
1 ping wlb-vpx-1.mydomain.net
The following error appears if the Workload Balancing virtual appliance is behind a hardware firewall,
and you did not configure the appropriate firewall settings: “There was an error connecting to the
Workload Balancing server: <pool name> Click Initialize WLB to reinitialize the connection settings.”
This error might also appear if the Workload Balancing appliance is otherwise unreachable.
If the Workload Balancing virtual appliance is behind a firewall, open port 8012.
Likewise, the port XenServer uses to contact Workload Balancing (8012 by default), must match the
port number specified when you ran the Workload Balancing Configuration wizard.
If you receive a connection error after configuring and connecting to Workload Balancing, the creden‑
tials might no longer be valid. To isolate this issue:
1. Verify that the credentials you entered in the Connect to WLB Server dialog box are correct. For
more information, see scenario 1 and 2.
2. Verify that the IP address or FQDN for the Workload Balancing virtual appliance that you entered
in the Connect to WLB Server dialog box is correct.
3. Verify that the user name you created during Workload Balancing configuration matches the
credentials you entered in the Connect to WLB Server dialog box.
4. If you receive a connection error in the Workload Balancing Status line on the WLB tab, you
might need to reconfigure Workload Balancing on that pool. Click the Connect button on the
WLB tab and reenter the host credentials.
You may encounter one of the following scenarios when attempting to establish a connection from
XenCenter to the Workload Balancing virtual appliance.
Scenario 1
This means that the credentials entered in the Citrix Hypervisor Credentials field in the Connect to
WLB Server dialog box are incorrect. To fix this, double‑check the credentials or check the Use the
current XenCenter credentials box.
Scenario 2
This means that there is a problem with the credentials entered in the WLB Server Credentials field in
the Connect to WLB Server dialog box when attempting to connect to the Workload Balancing virtual
appliance (either the username or the password are incorrect). However, it can also mean that the
Workload Balancing service is not running or that there is a problem with the database configuration
file.
To fix credential issues, make sure that you are using the correct username and password. The default
username for WLB Server Credentials field is wlbuser (not root). Root is the default administrator
username. Note that wlbuser is not an actual user with logon privileges in the appliance (it does
not exist under /etc/passwd) and thus these credentials are only used to connect to Workload
Balancing itself. As such, they can be easily reset by running the wlbconfig command. To change
your credentials, see Change the Workload Balancing credentials. To run the wlbconfig command,
you must be able to log into the appliance as root. If the root password is unknown, it can be reset
using the regular CentOS/RHEL password recovery procedure.
If you have reset your credentials but the error still persists:
1. Check if the Workload Balancing process is running by using the systemctl status
workloadbalancing command.
2. Make sure the wlb.conf file exists and is in the right directory by running this command: cat
/opt/vpx/wlb/wlb.conf
Scenario 3
This indicates that there is an issue connecting to the port specified under the Server Address options
when connecting to Workload Balancing from XenCenter (either the incorrect port was entered or the
port is not listening). To troubleshoot this:
Scenario 4
This error occurs when there is a problem with stunnel (either it’s not running or the certificate/key
pair is incorrect). To troubleshoot this, first verify the certificate and key:
1. Confirm the certificate has not expired by running the following command:
2. Compare the hex on the output of the following 2 commands. If the output does not match then
the wrong key is being used.
and
If there are no problems with the certificate and key, make sure stunnel is running and is bound to
port 8012 (or the configured port):
1 netstat -tulpn
On the output, 8012 (or the custom port) should show status: LISTEN.
2. If the appliance ran out of space, stunnel won’t run. Use commands like df -h or du -hs /*
to see whether you have enough space available on your appliance. To increase the disk space,
see Extend the virtual appliance disk.
Scenario 5
This error can occur because the stunnel process was terminated. If restarting the process yields the
same results, restart the Workload Balancing virtual appliance.
If you encounter any other errors when attempting to connect to Workload Balancing or need further
assistance performing the steps above, collect the Workload Balancing logs which can be found under
the /var/log/wlb directory in the Workload Balancing appliance.
If Workload Balancing doesn’t work (for example, it doesn’t let you save changes to settings), check
the Workload Balancing log file for the following error message:
This error typically occurs in pools that have one or more problematic VMs. When VMs are problematic,
you might see the following behavior:
1. Force the VM to shut down. To do so, you can do one of the following on the host with the
problematic VM:
• In XenCenter, select the VM, and then from the VM menu, click Force Shutdown.
• Run the vm-shutdown xe command with the force parameter set to true. For example:
You can find the host UUID on the General tab for that host (in XenCenter) or by running the
host-list xe command. You can find the VM UUID in the General tab for the VM or by
running the vm-list xe command. For more information, see Command line interface.
2. In the xsconsole of the XenServer serving the crashed VM or in XenCenter, migrate all VMs to
another host, then run the xe-toolstack-restart command. (Do not restart the toolstack
while HA is enabled. If possible, temporarily disable HA before restarting the toolstack.)
If you connect a pool to a different Workload Balancing server without disconnecting from Workload
Balancing, both old and new Workload Balancing servers monitor the pool.
To solve this problem, you can take one of the following actions:
• Shut down and delete the old Workload Balancing virtual appliance.
• Manually stop the Workload Balancing services. These services are analysis, data collector, and
Web service.
Note:
Do not use the pool-deconfigure-wlb xe command to disconnect a pool from the Work‑
load Balancing virtual appliance or use the pool-initialize-wlb xe command to specify
a different appliance.
September 3, 2024
Use the XenServer Conversion Manager virtual appliance to migrate your VMs running on VMware ES‑
Xi/vCenter to XenServer quickly and efficiently. You can batch convert multiple VMs in parallel at the
same time.
As part of the migration, XenCenter helps you prepare the VMs for networking and storage connectivity.
After converting your VMs to a XenServer environment, they’re almost ready to run. Complete the post‑
conversion tasks which include installing XenServer VM Tools for Windows on your Windows VMs. For
Linux VMs, the XenServer Conversion Manager automatically installs XenServer VM Tools for Linux
during the conversion process.
After converting your VMs, the Conversion Manager automatically shuts down by itself, saving re‑
sources on the host.
Learn more about moving from VMware to XenServer in our Tech Zone article: VMware to XenServer
migration guide.
Overview
• Batch convert multiple VMware ESXi/vCenter VMs in parallel using one simple wizard
• Map network settings between VMware and XenServer so your converted VMs can be up and
running with the proper network settings
• Select a storage location where you would like your new XenServer VMs to run
Notes:
• XenCenter does not remove or change your existing VMware environment. VMs are dupli‑
cated onto your XenServer environment and not removed from VMware.
• XenServer Conversion Manager virtual appliance does not require the source VMs to have
VMware Tools installed. You can perform conversion on VMware ESXi/vCenter VMs regard‑
less of whether they have VMware Tools installed.
• XenServer Conversion Manager virtual appliance cannot convert VMware ESXi/vCenter VMs
with four or more disks into XenServer VMs. Your VMware ESXi/vCenter VMs must have three
or fewer disks.
Understand XenServer
Before you can convert your environment, it is suggested that you become familiar with XenServer
concepts. For more information, see Technical overview.
To successfully convert VMware ESXi/vCenter VMs to XenServer, perform the following tasks:
• Set up a basic XenServer environment, including installing XenServer. For more information,
see Quick start and Install.
• Create a network in XenServer, assigning an IP address to a NIC. For more information, see Quick
start.
Compare VMware and XenServer terminology The following table lists the approximate
XenServer equivalent for common VMware features, concepts, and components:
Conversion overview
XenCenter and XenServer Conversion Manager virtual appliance create a copy of each targeted VM.
After converting the targeted VM to a XenServer VM with comparable networking and storage connec‑
tivity, XenCenter imports the VM into your XenServer pool or host.
You can convert as few as one or two VMs or perform batch conversions of an entire environment.
Simply select the VMs you want to convert and the Conversion Manager performs the conversions in
batches of 10 VMs at a time, automatically selecting the next set of 10 VMs in the queue once the job
is complete.
Note:
Before converting the VMs from vSphere, you must shut down the VMs (intended for conversion)
on vSphere. XenServer Conversion Manager virtual appliance does not support converting a run‑
ning VM using memory copied from vSphere to XenServer.
Also, before converting, ensure that a network and a storage controller exist in your VMware VM.
• XenCenter ‑ the XenServer management interface includes a conversion wizard where you set
conversion options and control conversion. You can install XenCenter on your Windows desktop.
XenCenter must be able to connect to XenServer and the XenServer Conversion Manager virtual
appliance.
• XenServer Conversion Manager virtual appliance ‑ a pre‑packaged VM you import into the
XenServer host or pool where you want to run the converted VMs. The virtual appliance con‑
verts the copies of the VMware ESXi/vCenter VMs into XenServer virtual machine format. After
conversion, it imports these copies into the XenServer pool or host.
• XenServer standalone host or pool ‑ the XenServer environment where you want to run the
converted VMs.
• VMware server ‑ XenServer Conversion Manager requires a connection to a VMware server that
manages the VMs you want to convert. This connection can be to a vCenter Server, ESXi Server,
or ESX Server. The VMs are not removed from the VMware server. Instead, the XenServer Con‑
version Manager Virtual Appliance makes a copy of these VMs and converts them to XenServer
virtual‑machine format.
3. How the VMware server responds to the XenServer Conversion Manager virtual appliance
during conversion.
The VMware server communicates with the XenServer Conversion Manager virtual appliance only
when the appliance queries the VMware server for environment information and disk data through‑
out the conversion.
Summary of how to convert VMs You can configure the XenServer Conversion Manager virtual ap‑
pliance and start to convert VMs in just a few easy steps:
1. Download the XenServer Conversion Manager virtual appliance from the XenServer downloads
page.
2. Import the XenServer Conversion Manager virtual appliance into XenServer using XenCenter.
4. From XenCenter, launch the conversion wizard and start to convert VMs.
5. Complete the post‑conversion tasks which include installing XenServer VM Tools for Windows
on your Windows VMs. For Linux VMs, the XenServer Conversion Manager automatically installs
XenServer VM Tools for Linux during the conversion process.
After converting your VMs, the Conversion Manager automatically shuts down by itself, saving re‑
sources on the host. For more information on how to convert VMware ESXi/vCenter VMs, see Get
started with Conversion Manager.
The latest version of the XenServer Conversion Manager virtual appliance is version 8.3.1. You can
download this version of the XenServer Conversion Manager virtual appliance from the XenServer
Downloads page.
If you already have a previous version of the XenServer Conversion Manager virtual appliance installed
and wish to upgrade to the latest version, there is no automatic upgrade path. Download the latest
version of the virtual appliance and remove the older version from your system.
• You can now batch convert multiple VMware ESXi/vCenter VMs in parallel at the same time.
Simply select the VMs you want to convert and the Conversion Manager performs the conver‑
sions in batches of 10 VMs at a time, automatically selecting the next set of 10 VMs in the queue
once the job is complete.
• Windows VMs converted from VMware to XenServer using the XenServer Conversion Manager
are incorrectly detected as Linux VMs.
To work around this issue, download and install XenServer VM Tools for Windows (available to
download from the XenServer downloads page) and then reboot your VM.
You can easily convert your VMware ESXi/vCenter virtual machines (VMs) to XenServer in just a few
steps:
2. Import and configure the XenServer Conversion Manager virtual appliance by using XenCenter.
Note:
If you already have a previous version of the XenServer Conversion Manager virtual appli‑
ance installed and wish to upgrade to the latest version, there is no automatic upgrade
path. Download the latest version of the virtual appliance from the XenServer downloads
page and remove the older version from your system.
3. From XenCenter, launch the conversion wizard and begin converting your VMware ESXi/vCenter
VMs to XenServer.
Before converting your VMware environment, you must create and prepare the target XenServer stand‑
alone host or pool to run the converted VMware ESXi/vCenter VMs. Preparing your environment in‑
cludes the following activities:
1. Defining a strategy of how you convert your VMware environment. Do you want to convert 1 or
2 VMs? Do you want to convert your entire environment? Do you want to create a pilot first to
ensure that your configuration is correct? Do you run both environments in parallel? Do you
want to maintain your existing cluster design when you convert to XenServer?
2. Planning your networking configuration. Do you want to connect to the same physical net‑
works? Do you want to simplify or change your networking configuration?
3. Installing XenServer on the hosts you want in the pool. Ideally, plug the NICs on the hosts into
their physical networks before you begin installation.
4. Creating a pool and performing any basic networking configuration. For example, do the fol‑
lowing:
• Configure a network to connect to the VMware cluster on the XenServer host (if the cluster
is not on the same network as the XenServer host).
• Configure a network to connect to the storage array. That is, if you use IP‑based storage,
create a XenServer network that connects to the physical network of the storage array.
5. (For shared storage and XenServer pools.) Preparing the shared storage where you store the
virtual disks and creating a connection to the storage, known as a Storage Repository (SR) on
the pool.
6. (Optional) Although not a requirement for conversion, you might want to configure the admin‑
istrator accounts on the XenServer pool to match those accounts on the VMware server. For in‑
formation about configuring Role‑based Access Control for Active Directory accounts, see Role‑
based access control.
Before you can convert VMware ESXi/vCenter VMs, ensure that you create a XenServer pool or host
where you want to run the converted VMs. This pool must have networking configured so it can con‑
nect to the VMware server. You might also want to configure the same physical networks on the
XenServer pool that you have in the VMware cluster, or simplify your networking configuration. If
you want to run the converted VMs in a pool, create a storage repository before conversion and add
the shared storage to the pool.
If you are new to XenServer, you can learn about XenServer basics, including basic installation and
configuration, by reading Quick start.
Before installing XenServer and importing the virtual appliance, consider the following factors that
might change your conversion strategy:
Selecting the host where you want to run the XenServer Conversion Manager virtual appliance.
Import the virtual appliance into the stand‑alone host or into a host in the pool where you run the
converted VMs.
For pools, you can run the virtual appliance on any host in the pool, provided its storage meets the
storage requirements.
Note:
We recommend that you run only one XenServer Conversion Manager in a pool at a time.
The storage configured for the pool or host where you want to run the converted VMs must meet
specific requirements. If you want to run your newly converted VMs in a pool, their virtual disks must
be stored on shared storage. However, if the converted VMs run on a single standalone host (not a
pool), their virtual disks can use local storage.
If you want to run the converted VMs in a pool, ensure that you add the shared storage to the pool by
creating a storage repository.
You can convert VMware ESXi/vCenter VMs running the following Windows guest operating systems:
Note:
• Red Hat Enterprise Linux 7.9 (64‑bit) with the following configuration:
• Red Hat Enterprise Linux 8.x (64‑bit) with the following configuration:
For more information about the guest operating systems supported by XenServer, see Guest operating
system support.
Meet networking requirements To convert VMware ESXi/vCenter VMs, the XenServer Conversion
Manager virtual appliance needs connectivity to a physical network or VLAN that can contact the
VMware server. (In the following sections, this network is referred to as the “VMware network”.)
If the VMware server is on a different physical network than the hosts in the XenServer pool, add the
network to XenServer before conversion.
Note:
• The time it takes for your VMs to be converted depends on the physical distance between
your VMware and XenServer networks and also the size of your VM’s virtual disk. You can
estimate how long the conversion will last by testing the network throughput between your
VMware server and XenServer.
• By default, the XenServer Conversion Manager uses HTTPS to download the VM’s virtual
disk during VM conversion. To speed up the migration process, you can switch the down‑
load path to HTTP.
Map your existing network configuration XenServer Conversion Manager virtual appliance
includes features that can reduce the amount of manual networking configuration needed after
you convert from your existing VMware ESXi/vCenter VMs to XenServer. For example, XenServer
Conversion Manager virtual appliance will:
• Preserve virtual MAC addresses on the VMware ESXi/vCenter VMs and reuse them in the resulting
XenServer VMs. Preserving the MAC addresses associated with virtual network adapters (virtual
MAC addresses) may:
– Be useful for software programs whose licensing references the virtual MAC addresses
• Map (virtual) network adapters. XenServer Conversion Manager virtual appliance can map
VMware networks onto XenServer networks so that after the VMs are converted, their virtual
network interfaces are connected accordingly.
For example, if you map VMware ‘Virtual Network 4’to XenServer ‘Network 0’, any VMware VM
that had a virtual adapter connected to ‘Virtual Network 4’is connected to ‘Network 0’after con‑
version. XenServer Conversion Manager virtual appliance does not convert or migrate any hy‑
pervisor network settings. The wizard only alters a converted VM's virtual network interface
connections based on the mappings provided.
Note:
You do not need to map all of your VMware networks on to the corresponding XenServer
networks. However, if you prefer, you can change the networks the VMs use, reduce, or
consolidate the number of networks in your new XenServer configuration.
To gain the maximum benefit from these features, we recommend the following:
– Before installing XenServer, plug the hosts into the networks on the switch (that is, the
ports) that you would like to configure on the host.
– Ensure that the XenServer pool can see the networks that you would like to be detected.
Specifically, plug the XenServer hosts into switch ports that can access the same networks
as the VMware cluster.
Though it is easier to plug the XenServer NICs into the same networks as the NICs on the VMware
hosts, it is not required. If you would like to change the NIC/network association, you can plug
a XenServer NIC into a different physical network.
Prepare for the XenServer Conversion Manager virtual appliance networking requirements
When you perform a conversion, you must create a network connection to the network where the
VMware server resides. XenServer Conversion Manager virtual appliance uses this connection for
conversion traffic between the XenServer host and the VMware server.
• When you import the XenServer Conversion Manager virtual appliance, specify the network you
added for conversion traffic as a virtual network interface. You can do so by configuring inter‑
face 1 so it connects to that network.
• Before you run the conversion wizard, add the network connecting VMware and XenServer to
the XenServer host where you want to run the converted VMs.
By default, when you import the XenServer Conversion Manager virtual appliance, XenCenter creates
one virtual network interface associated with Network 0 and NIC0 (eth0). When adding a network for
conversion, select a network other than XenServer’s management network to improve performance
in busy pools. For more information about the management interface, see Networking.
Inside the XenServer conversion manager, you might see multiple network interfaces (eth0 and eth1).
eth0 attaches to the host’s internal network which is used to communicate with the local dom0. eth1
attaches to the routable network which is used to communicate with XenCenter.
1. In the Resource pane in XenCenter, select the pool where you would like to run XenServer Con‑
version Manager virtual appliance.
4. On the Select Type page, select External Network, and click Next.
5. On the Name page, enter a meaningful name for the network (for example, ”VMware network”)
and a description.
• NIC. The NIC that you want XenServer to use to create the network. Select the NIC that is
plugged in to the physical or logical network of the VMware server.
• VLAN. If the VMware network is a VLAN, enter the VLAN ID (or ”tag”).
• MTU. If the VMware network uses jumbo frames, enter a value for the Maximum Transmis‑
sion Unit (MTU) between 1500 and 9216. Otherwise, leave the MTU box its default value of
1500.
Note:
Do not select the Automatically add this network to new virtual machines check
box.
7. Click Finish.
Meet storage requirements Before you convert batches of VMware ESXi/vCenter VMs, consider
your storage requirements. Converted VM disks are stored on a XenServer storage repository.
This storage repository must be large enough to contain the virtual disks for all the converted VMs you
want to run in that pool. For converted machines that only run on a standalone host, you can specify
either local or shared storage as the location for the converted virtual disks. For converted machines
running in pools, you can only specify shared storage.
1. In the Resource pane in XenCenter, select the pool where you intend to run the XenServer Con‑
version Manager virtual appliance.
3. Click New SR and follow the instructions in the wizard. For more instructions, press F1 to display
the online help.
XenServer requirements You can run VMs converted with this release of XenServer Conversion
Manager on the following versions of XenServer:
• XenServer 8
VMware requirements XenServer Conversion Manager virtual appliance can convert VMware ESX‑
i/vCenter VMs from the following versions of VMware:
Note:
XenServer Conversion Manager virtual appliance cannot convert VMware ESXi/vCenter VMs with
four or more disks into XenServer VMs. Your VMware ESXi/vCenter VMs must have three or fewer
disks.
Your VMware ESXi/vCenter VMs must also have a network and a storage controller configured.
Prepare to import the virtual appliance Before importing the virtual appliance, note the following
information and make the appropriate changes to your environment, as applicable.
Download the virtual appliance The XenServer Conversion Manager virtual appliance is packaged
in XVA format. You can download the virtual appliance from the XenServer downloads page. When
downloading the file, save it to a folder on your local hard drive (typically, but not necessarily, on the
computer where XenCenter is installed). After the .xva file is on your hard drive, you can import it
into XenCenter.
Virtual appliance prerequisites The XenServer Conversion Manager virtual appliance requires a
minimum of:
• Memory: 6 GB
The XenServer Conversion Manager virtual appliance is a single pre‑installed VM designed to run on
a XenServer host. Before importing it, review the prerequisite information and considerations in the
section called Preparing to import the virtual appliance.
To import the XenServer Conversion Manager virtual appliance into the pool or host where you want
to run the converted VMs, use the XenCenter Import wizard:
1. Open XenCenter. Right‑click on the pool (or host) into which you want to import the virtual
appliance package, and select Import.
3. Select the pool or a home server where you want to run the XenServer Conversion Manager
virtual appliance.
Note:
A home server is the host that provides the resources for a VM in a pool. While it can, a
XenServer attempts to start the VM on that host, before trying other hosts. If you select a
host, the XenServer Conversion Manager virtual appliance uses this host as its home server.
If you select the pool, the virtual appliance automatically starts on the most suitable host
in that pool.
4. Choose a storage repository on which to store the virtual disk for the XenServer Conversion
Manager virtual appliance and then click Import. To add a storage repository to the pool, see
the section called “Meet Storage Requirements.”You can choose either local or shared storage.
5. Ensure the network to be used for conversion (which connects the VMware server to the
XenServer host) is selected as the network associated with interface 1 (“virtual NIC 1”).
• If the correct network does not appear beside interface 1, use the list in the Network col‑
umn to select a different network.
• If you have not added the VMware network that is on a different physical network than the
pool, do the following:
Warning:
Do NOT configure NIC0 to your customer network. Assign NIC0 only to ”Host internal
management network.”
6. Leave the Start VM after import check box enabled, and click Finish to import the virtual ap‑
pliance.
7. After importing the .xva file, the XenServer Conversion Manager virtual appliance appears in
the Resources pane in XenCenter.
Before you can use the XenServer Conversion Manager virtual appliance to convert VMware ESXi/v‑
Center VMs, configure it using the XenCenter Console tab:
1. After importing the XenServer Conversion Manager virtual appliance, click the Console tab.
2. Read the license agreement. To view the contents of the license agreement, open the URL in a
web browser. Press any key to continue.
3. Enter and confirm a new root password for the XenServer Conversion Manager virtual appliance.
We recommend selecting a strong password.
4. Enter a host name for the XenServer Conversion Manager virtual appliance.
5. Enter the domain suffix for the virtual appliance. For example, if the fully qualified domain name
(FQDN) for the virtual appliance is citrix-migrate-vm.domain4.example.com, enter
domain4.example.com.
6. Enter y to use DHCP to obtain the IP address automatically for the XenServer Conversion Man‑
ager virtual appliance. Otherwise, enter n and then enter a static IP address, subnet mask, and
gateway for the VM.
7. Review the host name and network setting and enter y when prompted. This step completes
the XenServer Conversion Manager virtual appliance configuration process.
8. When you have successfully configured the appliance, a login prompt appears. Enter the login
credentials and press Enter to log in to the XenServer Conversion Manager virtual appliance.
If you do not configure the XenServer Conversion Manager correctly, you might have to reconfigure the
virtual appliance. For more information, see Reconfigure the XenServer Conversion Manager virtual
appliance.
Reconfigure the XenServer Conversion Manager virtual appliance If you need to change the con‑
figuration of the XenServer Conversion Manager after installing the virtual appliance, you can follow
these steps to reconfigure it:
1. Log in to the XenServer Conversion Manager virtual appliance by using SSH or the XenCenter
Console tab as root user.
2. Delete the following file: /etc/init.d/vpx_startup_setup_done.
3. Reboot the virtual appliance by using XenCenter.
4. Reconfigure the virtual appliance by using XenCenter Console tab.
When you convert VMware ESXi/vCenter VMs, they are imported into the XenServer pool or standalone
host where you are running the XenServer Conversion Manager virtual appliance. Converted VMs re‑
tain their original VMware settings for the virtual processor and virtual memory.
Before you start the conversion procedure, ensure that the following is true:
• You have the credentials for the XenServer pool (or standalone host). Either the root account
credentials or a Role‑Based Access Control (RBAC) account with the Pool Admin role configured
is acceptable.
• You have the credentials for the VMware server containing the VMs you want to convert. The
conversion procedure requires you connect the XenServer Conversion Manager Console to the
VMware server.
• The VMware virtual machines to convert are powered off.
• The VMware virtual machines to convert have a network and a storage controller configured.
• The XenServer pool (or host) that run the converted VMs is connected to a storage repository.
The storage repository must contain enough space for the converted virtual disks.
• If you want to run your newly converted VMs in a pool, the storage repository must be shared
storage. However, if the converted VMs run on a single standalone host (not a pool), you can use
local storage.
• The virtual disks of the VM to convert are less than 2 TiB.
• XenServer pool (or host) has networks that the converted VMs use.
To convert your VMware ESXi/vCenter VMs into VMs that can run in a XenServer environment:
1. Ensure that the virtual appliance is installed and running on the XenServer host or pool where
you want to import the VMs.
The Conversion Manager window opens. Wait while the wizard connects to your virtual appli‑
ance.
4. In the New Conversion wizard, enter the credentials for the VMware server:
• Server. Enter the IP address or FQDN for the VMware server that contains the VMs you
want to convert to XenServer.
• Username. Enter a valid user name for this VMware server. This account must either be a
VMware admin account or have a Root role.
• Password. Enter the password for the user account you specified in the Username box.
5. In the Virtual Machines page, select from the list of VMs hosted in the VMware server the VMs
that you want to convert. Click Next.
6. In the Storage page, select the storage repository you want to use during conversion. This stor‑
age repository is where the VMs and the virtual disks that you are creating are stored perma‑
nently.
This tab indicates the proportion of available storage that the virtual disks of the converted VMs
consume.
7. On the Networking page, for each VMware network listed, select the XenServer network to map
it to. You can also select whether to preserver virtual MAC addresses. Click Next.
8. Review the options you configured for the conversion process. You can click Previous to change
these options. To proceed with the configuration shown, click Finish.
The conversion process begins. Conversion from ESXi or vSphere can take several minutes de‑
pending on the size of the virtual disks.
After converting your VMs, the Conversion Manager automatically shuts down by itself, saving
resources on the host. Start a VM by selecting the VM’s host and then clicking Pool > Conversion
Manager.
The Conversion Manager window displays conversions in progress and completed conversions.
For Windows VMs, you must install XenServer VM Tools for Windows. For Linux VMs, you do not need
to install XenServer VM Tools for Linux as the Conversion Manager automatically installs it during the
conversion process.
After conversion, in XenCenter perform the following steps on your newly converted VMs:
On Windows Machines:
1. On Windows VMs, depending on your Microsoft licensing model, you might have to reactivate
the VM’s Windows license. This reactivation happens because the Windows operating system
perceives the conversion as a hardware change.
2. On Windows VMs, install XenServer VM Tools for Windows to obtain high‑speed I/O for enhanced
disk and network performance. XenServer VM Tools for Windows also enable certain functions
and features, including cleanly shutting down, rebooting, suspending, and live migrating VMs.
You can download the XenServer VM Tools for Windows from the XenServer downloads page.
If you are working with a VM that does not have XenServer VM Tools installed, a XenServer VM Tools
not installed message appears on the General tab in the General pane.
Note:
XenServer VM Tools for Windows must be installed on each Windows VM for the VM to have a
fully supported configuration. Although Windows VMs function without XenServer VM Tools for
Windows, their performance can be impacted.
On Linux VMs, configure the VNC server. For more information, see Enable VNC for Linux VMs.
Note:
The Manage Conversions window enables you to perform other tasks related to converting VMs.
These tasks include clearing jobs, saving a summary of jobs, retrying jobs, canceling jobs, and
displaying the log file.
To retry a job:
Note:
To cancel a job:
Note:
March 6, 2024
This section provides information about troubleshooting the conversion process and converted
VMs.
In general, conversion runs smoothly and XenServer Conversion Manager virtual appliance converts
VMs without any issues. However, in some rare cases, you might receive errors when attempting to
open converted VMs. The following sections provide some guidance on resolving errors and other
issues.
This stop code indicates that XenServer Conversion Manager virtual appliance was unable to configure
a Windows device that is critical to boot in XenServer for the first time. Save the logs and send them
to Support for further guidance.
Depending on your licensing model, an error message on system activation might appear when you
attempt to start a Windows VM.
If you import a Windows VM from an ESXi server to XenServer, the IPv4/IPv6 network settings can be
lost. To retain the network settings, reconfigure the IPv4/IPv6 settings after completing the conver‑
sion.
If a VMware VM boots from a SCSI disk but also has IDE hard disks configured, the VM might not boot
when you convert it to XenServer. This issue occurs because the migration process assigns the IDE
hard disks lower device numbers than SCSI disks. However, XenServer boots from the hard disk as‑
signed to device 0. To resolve this issue, rearrange the virtual disk position in XenCenter so that the
VM reboots from the virtual disk that contains the operating system.
To change the position of the virtual disk containing the operating system:
1. In the XenCenter Resources pane, select the powered off guest VM.
3. From the Virtual Disks list, select the virtual disk containing the operating system and then click
Properties.
4. In the virtual disk’s Properties dialog, click the vm_name tab to display device options.
If you experience problems or errors when converting VMs, try exporting the VMware VM as an OVF
package. If you cannot export the VMware VM as an OVF package, Conversion Manager cannot con‑
vert this VM. Use the error messages you receive when attempting to export the VM as an OVF package
to troubleshoot and fix the issues with your VMware VM. For example, you might have to configure a
network or a storage controller before the VM can be exported as an OVF package or converted. For
more information about troubleshooting your VMware ESXi/vCenter VMs, see the VMware documen‑
tation.
If you see any errors when converting Linux VMs, remove the converted VM, restart the XenServer
Conversion Manager virtual appliance and retry.
Logs of failed conversions are stored in the XenServer Conversion Manager virtual appliance and can
be retrieved by clicking Fetch All Logs on the Conversion Manager window. When you contact Sup‑
port to raise any issues, we recommend that you provide the conversion log file and, additionally, a
full server status report for troubleshooting. For more information, see Creating a Server Status Re‑
port.
Command‑line interface
The xe command line interface is installed by default on all XenServer hosts. A remote Windows ver‑
sion is included with XenCenter. A stand‑alone remote CLI is also available for Linux.
The xe command line interface is installed by default on your host. You can run xe CLI commands in
the dom0 console. Access the dom0 console in one of the following ways:
• In XenCenter, go to the Console tab for the host where you want to run the command.
• SSH into the host where you want to run the command.
On Windows
To use the xe.exe command, open a Windows Command Prompt and change directories to the
directory where the xe.exe file is located (typically C:\Program Files (x86)\XenServer
\XenCenter). If you add the xe.exe installation location to your system path, you can use the
command without having to change into the directory.
On Linux
On RPM‑based distributions (such as Red Hat), you can install the stand‑alone xe command from the
RPM named client_install/xapi-xe-BUILD.x86_64.rpm on the main XenServer installa‑
tion ISO.
You can use parameters at the command line to define the XenServer host, user name, and password
to use when running xe commands. However, you also have the option to set this information as an
environment variable. For example:
Note:
The remote xe CLI on Linux might hang when attempting to run commands over a secure con‑
nection and these commands involve file transfer. If so, you can use the --no-ssl parameter
to run the command over an insecure connection to the XenServer host.
1 xe help command
1 xe help
1 xe help --all
Basic xe syntax
Each specific command contains its own set of arguments that are of the form argument=value.
Some commands have required arguments, and most have some set of optional arguments. Typi‑
cally a command assumes default values for some of the optional arguments when invoked without
them.
If the xe command runs remotely, extra arguments are used to connect and authenticate. These argu‑
ments also take the form argument=argument_value.
The server argument is used to specify the host name or IP address. The username and
password arguments are used to specify credentials.
A password-file argument can be specified instead of the password directly. In this case, the xe
command attempts to read the password from the specified file and uses that password to connect.
(Any trailing CRs and LFs at the end of the file are stripped off.) This method is more secure than
specifying the password directly at the command line.
The optional port argument can be used to specify the agent port on the remote XenServer host
(defaults to 443).
1 xe vm-list
• -u user name
• -pw password
• -pwf password file
• -p port
• -s server
Arguments are also taken from the environment variable XE_EXTRA_ARGS, in the form of comma‑
separated key/value pairs. For example, to enter commands that are run on a remote XenServer host,
first run the following command:
1 export XE_EXTRA_ARGS="server=jeffbeck,port=443,username=root,password=
pass"
After running this command, you no longer have to specify the remote XenServer host parameters in
each xe command that you run.
Using the XE_EXTRA_ARGS environment variable also enables tab completion of xe commands when
issued against a remote XenServer host, which is disabled by default.
Unless the value includes spaces, do not use quotes. Do not include whitespace between the argu‑
ment name, the equals sign (=), and the value. Any argument not conforming to this format is ig‑
nored.
When you use the CLI on your XenServer host, commands have a tab completion feature similar to
the feature in the standard Linux bash shell. For example, if you type xe vm-l and then press the
TAB key, the rest of the command is displayed. If more than one command begins with vm-l, press‑
ing TAB a second time lists the possibilities. This feature is useful when specifying object UUIDs in
commands.
Note:
Tab completion does not normally work when running commands on a remote XenServer host.
However, if you set the XE_EXTRA_ARGS variable on the machine where you enter the commands,
tab completion is enabled. For more information, see Basic xe syntax.
Command types
The CLI commands can be split in two halves. Low‑level commands are concerned with listing and
parameter manipulation of API objects. Higher level commands are used to interact with VMs or hosts
in a more abstract level.
• class‑list
• class‑param‑get
• class‑param‑set
• class‑param‑list
• class‑param‑add
• class‑param‑remove
• class‑param‑clear
• bond
• console
• host
• host-crashdump
• host-cpu
• network
• patch
• pbd
• pif
• pool
• sm
• sr
• task
• template
• vbd
• vdi
• vif
• vlan
• vm
Not every value of class has the full set of class‑param‑action commands. Some values of class have
a smaller set of commands.
Parameter types
The objects that are addressed with the xe commands have sets of parameters that identify them and
define their states.
Most parameters take a single value. For example, the name-label parameter of a VM contains a
single string value. In the output from parameter list commands, such as xe vm-param-list, a
value in parentheses indicates whether parameters are read‑write (RW) or read‑only (RO).
The output of xe vm-param-list on a specified VM might have the following lines:
1 user-version ( RW): 1
2 is-control-domain ( RO): false
The first parameter, user-version, is writable and has the value 1. The second, is-control-
domain, is read‑only and has a value of false.
The two other types of parameters are multi‑valued. A set parameter contains a list of values. A map
parameter is a set of key/value pairs. As an example, look at the following piece of sample output of
the xe vm-param-list on a specified VM:
1 platform (MRW): acpi: true; apic: true; pae: true; nx: false
2 allowed-operations (SRO): pause; clean_shutdown; clean_reboot; \
3 hard_shutdown; hard_reboot; suspend
The platform parameter has a list of items that represent key/value pairs. The key names are fol‑
lowed by a colon character (:). Each key/value pair is separated from the next by a semicolon char‑
acter (;). The M preceding the RW indicates that this parameter is a map parameter and is readable
and writable. The allowed-operations parameter has a list that makes up a set of items. The S
preceding the RO indicates that this is a set parameter and is readable but not writable.
To filter on a map parameter or set a map parameter, use a colon (:) to separate the map parameter
name and the key/value pair. For example, to set the value of the foo key of the other-config
parameter of a VM to baa, the command would be
There are several commands for operating on parameters of objects: class‑param‑get, class‑param‑
set, class‑param‑add, class‑param‑remove, class‑param‑clear, and class‑param‑list. Each of these
commands takes a uuid parameter to specify the particular object. Since these commands are con‑
sidered low‑level commands, they must use the UUID and not the VM name label.
• xe class-param-list uuid=uuid
Lists all of the parameters and their associated values. Unlike the class‑list command, this com‑
mand lists the values of “expensive”fields.
Returns the value of a particular parameter. For a map parameter, specifying the param‑key gets
the value associated with that key in the map. If param‑key is not specified or if the parameter
is a set, the command returns a string representation of the set or map.
Adds to either a map or a set parameter. For a map parameter, add key/value pairs by using the
key=value syntax. If the parameter is a set, add keys with the param‑key=key syntax.
The class‑list command lists the objects of type class. By default, this type of command lists all objects,
printing a subset of the parameters. This behavior can be modified in the following ways:
To change the parameters that are printed, specify the argument params as a comma‑separated list
of the required parameters. For example:
1 xe vm-list params=name-label,other-config
1 xe vm-list params=all
The list command doesn’t show some parameters that are expensive to calculate. These parameters
are shown as, for example:
To filter the list, the CLI matches parameter values with those values specified on the command‑line,
only printing objects that match all of the specified constraints. For example:
This command lists only those VMs for which both the field power-state has the value halted and
the field HVM-boot-policy has the value BIOS order.
You can also filter the list by the value of keys in maps or by the existence of values in a set. The
syntax for filtering based on keys in maps is map-name:key=value. The syntax for filtering based
on values existing in a set is set-name:contains=value.
When scripting, a useful technique is passing --minimal on the command line, causing xe to
print only the first field in a comma‑separated list. For example, the command xe vm-list --
minimal on a host with three VMs installed gives the three UUIDs of the VMs:
1 a85d6717-7264-d00e-069b-3b1d19d56ad9,aaa3eec5-9499-bcf3-4c03-
af10baea96b7, \
2 42c044de-df69-4b30-89d9-2c199564581d
Secrets
XenServer provides a secrets mechanism to avoid passwords being stored in plaintext in command‑
line history or on API objects. XenCenter uses this feature automatically and it can also be used from
the xe CLI for any command that requires a password.
Note:
Password secrets cannot be used to authenticate with a XenServer host from a remote instance
of the xe CLI.
To create a secret object, run the following command on your XenServer host.
1 xe secret-create value=my-password
A secret is created and stored on the XenServer host. The command outputs the UUID of the secret
object. For example, 99945d96-5890-de2a-3899-8c04ef2521db. Append _secret to the
name of the password argument to pass this UUID to any command that requires a password.
Example: On the XenServer host where you created the secret, you can run the following com‑
mand:
Command history
For the bash shell, you can use the HISTCONTROL variable to control which commands are stored in
the shell history.
xe command reference
This section groups the commands by the objects that the command addresses. These objects are
listed alphabetically.
Appliance commands
Commands for creating and modifying VM appliances (also known as vApps). For more information,
see vApps.
Appliance parameters
appliance-assert-can-be-recovered
appliance-create
1 xe appliance-create name-label=my_appliance
appliance-destroy
1 xe appliance-destroy uuid=appliance-uuid
1 xe appliance-destroy uuid=appliance-uuid
appliance-recover
appliance-shutdown
1 xe appliance-shutdown uuid=appliance-uuid
appliance-start
1 xe appliance-start uuid=appliance-uuid
Audit commands
Audit commands download all of the available records of the RBAC audit file in the pool. If the optional
parameter since is present, it downloads only the records from that specific point in time.
audit-log-get parameters
audit-log-get
For example, to obtain audit records of the pool since a precise millisecond timestamp, run the fol‑
lowing command:
Bonding commands
Commands for working with network bonds, for resilience with physical interface failover. For more
information, see Networking.
The bond object is a reference object which glues together master and member PIFs. The master PIF
is the bonding interface which must be used as the overall PIF to refer to the bond. The member
PIFs are a set of two or more physical interfaces that have been combined into the high‑level bonded
interface.
Bond parameters
bond-create
Create a bonded network interface on the network specified from a list of existing PIF objects. The
command fails in any of the following cases:
bond-destroy
1 xe bond-destroy uuid=bond_uuid
bond-set-mode
CD commands
CD parameters
cd-list
List the CDs and ISOs (CD image files) on the XenServer host or pool, filtering on the optional argument
params.
If the optional argument params is used, the value of params is a string containing a list of parame‑
ters of this object that you want to display. Alternatively, you can use the keyword all to show all
parameters. When params is not used, the returned list shows a default subset of all available para‑
meters.
Optional arguments can be any number of the CD parameters listed at the beginning of this section.
Cluster commands
Clustered pools are resource pools that have the clustering feature enabled. Use these pools with
GFS2 SRs. For more information, see Clustered pools
The cluster and cluster‑host objects can be listed with the standard object listing commands (xe
cluster-list and xe cluster-host-list), and the parameters manipulated with the stan‑
dard parameter commands. For more information, see Low‑level parameter commands.
Commands for working with clustered pools.
Cluster parameters
cluster-host-destroy
1 xe cluster-host-destroy uuid=host_uuid
cluster-host-disable
1 xe cluster-host-disable uuid=cluster_uuid
cluster-host-enable
1 xe cluster-host-enable uuid=cluster_uuid
cluster-host-force-destroy
1 xe cluster-host-force-destroy uuid=cluster_host
cluster-pool-create
cluster-pool-destroy
1 xe cluster-pool-destroy cluster-uuid=cluster_uuid
Destroy pool‑wide cluster. The pool continues to exist, but it is no longer clustered and can no longer
use GFS2 SRs.
cluster-pool-force-destroy
1 xe cluster-pool-force-destroy cluster-uuid=cluster_uuid
cluster-pool-resync
1 xe cluster-pool-resync cluster-uuid=cluster_uuid
Console commands
The console objects can be listed with the standard object listing command (xe console-list),
and the parameters manipulated with the standard parameter commands. For more information, see
Low‑level parameter commands.
Console parameters
console
1 xe console
Diagnostic commands
diagnostic-compact
1 xe diagnostic-compact
diagnostic-db-stats
1 xe diagnostic-db-stats
diagnostic-gc-stats
1 xe diagnostic-gc-stats
Print GC statistics.
diagnostic-license-status
1 xe diagnostic-license-status
diagnostic-net-stats
diagnostic-timing-stats
1 xe diagnostic-timing-stats
diagnostic-vdi-status
1 xe diagnostic-vdi-status uuid=vdi_uuid
diagnostic-vm-status
1 xe diagnostic-vm-status uuid=vm_uuid
Query the hosts on which the VM can boot, check the sharing/locking status of all VBDs.
drtask-create
Creates a disaster recovery task. For example, to connect to an iSCSI SR in preparation for Disaster
Recovery:
Note:
The command sr-whitelist lists SR UUIDs that are allowed. The drtask-create com‑
mand only introduces and connects to an SR which has one of the allowed UUIDs
drtask-destroy
1 xe drtask-destroy uuid=dr-task-uuid
vm-assert-can-be-recovered
appliance-assert-can-be-recovered
appliance-recover
vm-recover
sr-enable-database-replication
1 xe sr-enable-database-replication uuid=sr_uuid
sr-disable-database-replication
1 xe sr-disable-database-replication uuid=sr_uuid
Example usage
1 xe sr-database-replication uuid=sr=uuid
After a disaster, on the secondary site, connect to the SR. The device-config command has the
same fields as sr-probe.
1 xe drtask-create type=lvmoiscsi \
2 device-config:target=target ip address \
3 device-config:targetIQN=target-iqn \
4 device-config:SCSIid=scsi-id \
5 sr-whitelist=sr-uuid
1 xe vm-list database:vdi-uuid=vdi-uuid
Recover a VM:
Destroy the DR task. Any SRs introduced by the DR task and not required by VMs are destroyed:
1 xe drtask-destroy uuid=drtask-uuid
Event commands
Event classes
event-wait
Blocks other commands from running until an object exists that satisfies the conditions given on the
command line. The argument x=y means “wait for field x to take value y”and x=/=y means “wait for
field x to take any value other than y.”
Blocks other commands until a VM with UUID $VM reboots. The command uses the value of start-
time to decide when the VM reboots.
The class name can be any of the event classes listed at the beginning of this section. The parameters
can be any of the parameters listed in the CLI command class‑param‑list.
GPU commands
Commands for working with physical GPUs, GPU groups, and virtual GPUs.
The GPU objects can be listed with the standard object listing commands: xe pgpu-list, xe
gpu-group-list, and xe vgpu-list. The parameters can be manipulated with the standard
parameter commands. For more information, see Low‑level parameter commands.
pgpu-disable-dom0-access
1 xe pgpu-disable-dom0-access uuid=uuid
pgpu-enable-dom0-access
1 xe pgpu-enable-dom0-access uuid=uuid
gpu-group-create
1 xe gpu-group-create name-label=name_for_group [name-description=
description]
Creates a new (empty) GPU Group into which pGPUs can be moved.
gpu-group-destroy
1 xe gpu-group-destroy uuid=uuid_of_group
gpu-group-get-remaining-capacity
1 xe gpu-group-get-remaining-capacity uuid=uuid_of_group vgpu-type-uuid=
uuid_of_vgpu_type
Returns how many more virtual GPUs of the specified type can be instantiated in this GPU Group.
gpu-group-param-set
1 xe gpu-group-param-set uuid=uuid_of_group allocation-algorithm=breadth-
first|depth-first
Changes the algorithm that the GPU group uses to allocate virtual GPUs to pGPUs.
Note:
GPU pass‑through and virtual GPUs are not compatible with live migration, storage live migra‑
tion, or VM Suspend unless supported software and graphics cards from GPU vendors are present.
VMs without this support cannot be migrated to avoid downtime. For information about NVIDIA
vGPU compatibility with live migration, storage live migration, and VM Suspend, see Graphics.
vgpu-create
1 xe vgpu-create vm-uuid=uuid_of_vm gpu_group_uuid=uuid_of_gpu_group [
vgpu-type-uuid=uuid_of_vgpu-type]
Creates a virtual GPU. This command attaches the VM to the specified GPU group and optionally spec‑
ifies the virtual GPU type. If no virtual GPU type is specified, the ‘pass‑through’type is assumed.
vgpu-destroy
1 xe vgpu-destroy uuid=uuid_of_vgpu
Using false disables the VNC console for a VM as it passes disablevnc=1 through to the display
emulator. By default, VNC is enabled.
Host commands
XenServer hosts are the physical servers running XenServer software. They have VMs running on them
under the control of a special privileged Virtual Machine, known as the control domain or domain 0.
The XenServer host objects can be listed with the standard object listing commands: xe host-
list, xe host-cpu-list, and xe host-crashdump-list). The parameters can be manip‑
ulated with the standard parameter commands. For more information, see Low‑level parameter com‑
mands.
Host selectors
Several of the commands listed here have a common mechanism for selecting one or more
XenServer hosts on which to perform the operation. The simplest is by supplying the argument
host=uuid_or_name_label. You can also specify XenServer by filtering the full list of hosts
on the values of fields. For example, specifying enabled=true selects all XenServer hosts whose
enabled field is equal to true. Where multiple XenServer hosts match and the operation can be
performed on multiple XenServer hosts, you must specify --multiple to perform the operation.
The full list of parameters that can be matched is described at the beginning of this section. You
can obtain this list of commands by running the command xe host-list params=all. If no
parameters to select XenServer hosts are given, the operation is performed on all XenServer hosts.
Host parameters
XenServer hosts contain some other objects that also have parameter lists.
host-all-editions
1 xe host-all-editions
host-apply-edition
Assigns the XenServer license to a host server. When you assign a license, XenServer contacts the
license server and requests the specified type of license. If a license is available, it is then checked out
from the license server.
host-backup
Download a backup of the control domain of the specified XenServer host to the machine that the
command is invoked from. Save it there as a file with the name file-name.
Important:
While the xe host-backup command works if run on the local host (that is, without a specific
host name specified), do not use it this way. Doing so would fill up the control domain partition
with the backup file. Only use the command from a remote off‑host machine where you have
space to hold the backup file.
host-bugreport-upload
Generate a fresh bug report (using xen-bugtool, with all optional files included) and upload to the
Support FTP site or some other location.
The hosts on which to perform this operation are selected using the standard selection mechanism
(see host selectors above). Optional arguments can be any number of the host parameters listed at
the beginning of this section.
Optional parameters are http-proxy: use specified HTTP proxy, and url: upload to this destina‑
tion URL. If optional parameters are not used, no proxy server is identified and the destination is the
default Support FTP site.
host-call-plugin
Calls the function within the plug‑in on the given host with optional arguments.
host-compute-free-memory
1 xe host-compute-free-memory
host-compute-memory-overhead
1 xe host-compute-memory-overhead
host-cpu-info
1 xe host-cpu-info [uuid=uuid]
host-crashdump-destroy
1 xe host-crashdump-destroy uuid=crashdump_uuid
Delete a host crashdump specified by its UUID from the XenServer host.
host-crashdump-upload
Upload a crashdump to the Support FTP site or other location. If optional parameters are not used,
no proxy server is identified and the destination is the default Support FTP site. Optional parameters
are http-proxy: use specified HTTP proxy, and url: upload to this destination URL.
host-declare-dead
1 xe host-declare-dead uuid=host_uuid
Warning:
This call is dangerous and can cause data loss if the host is not actually dead.
host-disable
1 xe host-disable [host-selector=host_selector_value...]
Disables the specified XenServer hosts, which prevents any new VMs from starting on them. This ac‑
tion prepares the XenServer hosts to be shut down or rebooted. After that host reboots, if all condi‑
tions for enabling are met (for example, storage is available), the host is automatically re‑enabled.
The hosts on which to perform this operation are selected using the standard selection mechanism
(see host selectors). Optional arguments can be any number of the host parameters listed at the be‑
ginning of this section.
host-disable-display
1 xe host-disable-display uuid=host_uuid
host-disable-local-storage-caching
1 xe host-disable-local-storage-caching
host-dmesg
1 xe host-dmesg [host-selector=host_selector_value...]
Get a Xen dmesg (the output of the kernel ring buffer) from specified XenServer hosts.
The hosts on which to perform this operation are selected using the standard selection mechanism
(see host selectors above). Optional arguments can be any number of the host parameters listed at
the beginning of this section.
host-emergency-ha-disable
1 xe host-emergency-ha-disable [--force]
Disable HA on the local host. Only to be used to recover a pool with a broken HA setup.
host-emergency-management-reconfigure
1 xe host-emergency-management-reconfigure interface=
uuid_of_management_interface_pif
Reconfigure the management interface of this XenServer host. Use this command only if the
XenServer host is in emergency mode. Emergency mode means that the host is a member in a
resource pool whose pool coordinator has disappeared from the network and cannot be contacted
after a number of retries.
host-emergency-reset-server-certificate
1 xe host-emergency-reset-server-certificate
Installs a self‑signed certificate on the XenServer host where the command is run.
host-enable
1 xe host-enable [host-selector=host_selector_value...]
Enables the specified XenServer hosts, which allows new VMs to be started on them.
The hosts on which to perform this operation are selected using the standard selection mechanism
(see host selectors above). Optional arguments can be any number of the host parameters listed at
the beginning of this section.
host-enable-display
1 xe host-enable-display uuid=host_uuid
host-enable-local-storage-caching
1 xe host-enable-local-storage-caching sr-uuid=sr_uuid
host-evacuate
1 xe host-evacuate [host-selector=host_selector_value...]
Live migrates all running VMs to other suitable hosts on a pool. First, disable the host by using the
host-disable command.
If the evacuated host is the pool coordinator, then another host must be selected to be the pool coordi‑
nator. To change the pool coordinator with HA disabled, use the pool-designate-new-master
command. For more information, see pool‑designate‑new‑master.
With HA enabled, your only option is to shut down the XenServer host, which causes HA to elect a new
pool coordinator at random. For more information, see host‑shutdown.
The hosts on which to perform this operation are selected using the standard selection mechanism
(see host selectors above). Optional arguments can be any number of the host parameters listed at
the beginning of this section.
host-forget
1 xe host-forget uuid=host_uuid
The XAPI agent forgets about the specified XenServer host without contacting it explicitly.
Use the --force parameter to avoid being prompted to confirm that you really want to perform this
operation.
Warning:
Do not use this command if HA is enabled on the pool. Disable HA first, then enable it again after
you’ve forgotten the host.
This command is useful if the XenServer host to “forget”is dead. However, if the XenServer host is live
and part of the pool, use xe pool-eject instead.
host-get-server-certificate
1 xe host-get-server-certificate
host-get-sm-diagnostics
1 xe host-get-sm-diagnostics uuid=uuid
host-get-system-status
Download system status information into the specified file. The optional parameter entries is a
comma‑separated list of system status entries, taken from the capabilities XML fragment returned
by the host-get-system-status-capabilities command. For more information, see host‑
get‑system‑status‑capabilities. If not specified, all system status information is saved in the file. The
parameter output may be tar.bz2 (the default) or zip. If this parameter is not specified, the file is
saved in tar.bz2 form.
The hosts on which to perform this operation are selected using the standard selection mechanism
(see host selectors above).
host-get-system-status-capabilities
1 xe host-get-system-status-capabilities [host-selector=
host_selector_value...]
Get system status capabilities for the specified hosts. The capabilities are returned as an XML fragment
that similar to the following example:
• default-checked Can be either yes or no. Indicates whether a UI selects this entry by de‑
fault.
• min-size, max-size Indicates an approximate range for the size, in bytes, of this entry. ‑1
indicates that the size is unimportant.
• min-time, max-time Indicate an approximate range for the time, in seconds, taken to collect
this entry. ‑1 indicates that the time is unimportant.
• pii Personally identifiable information. Indicates whether the entry has information that can
identify the system owner or details of their network topology. The attribute can have one of
the following values:
Passwords are never to be included in any bug report, regardless of any PII declaration.
The hosts on which to perform this operation are selected using the standard selection mechanism
(see host selectors above).
host-get-thread-diagnostics
1 xe host-get-thread-diagnostics uuid=uuid
host-get-vms-which-prevent-evacuation
1 xe host-get-vms-which-prevent-evacuation uuid=uuid
Return a list of VMs which prevent the evacuation of a specific host and display reasons for each one.
host-is-in-emergency-mode
1 xe host-is-in-emergency-mode
Returns true if the host the CLI is talking to is in emergency mode, false otherwise. This CLI com‑
mand works directly on pool member hosts even with no pool coordinator present.
host-license-view
1 xe host-license-view [host-uuid=host_uuid]
host-logs-download
Download a copy of the logs of the specified XenServer hosts. The copy is saved by default in a time‑
stamped file named hostname-yyyy-mm-dd T hh:mm:ssZ.tar.gz. You can specify a differ‑
ent file name using the optional parameter file‑name.
The hosts on which to perform this operation are selected using the standard selection mechanism
(see host selectors above). Optional arguments can be any number of the host parameters listed at
the beginning of this section.
Important:
While the xe host-logs-download command works if run on the local host (that is, without
a specific host name specified), do not use it this way. Doing so clutters the control domain par‑
tition with the copy of the logs. Only use the command from a remote off‑host machine where
you have space to hold the copy of the logs.
host-management-disable
1 xe host-management-disable
Disables the host agent listening on an external management network interface and disconnects all
connected API clients (such as the XenCenter). This command operates directly on the XenServer
host the CLI is connected to. The command is not forwarded to the pool coordinator when applied to
a member XenServer host.
Warning:
Be careful when using this CLI command off‑host. After this command is run, you cannot connect
to the control domain remotely over the network to re‑enable the host agent.
host-management-reconfigure
Reconfigures the XenServer host to use the specified network interface as its management interface,
which is the interface that is used to connect to the XenCenter. The command rewrites the MANAGE‑
MENT_INTERFACE key in /etc/xensource-inventory.
If the device name of an interface (which must have an IP address) is specified, the XenServer host
immediately rebinds. This command works both in normal and emergency mode.
If the UUID of a PIF object is specified, the XenServer host determines which IP address to rebind to
itself. It must not be in emergency mode when this command is run.
Warning:
Be careful when using this CLI command off‑host and ensure that you have network connectivity
on the new interface. Use xe pif-reconfigure to set one up first. Otherwise, subsequent
CLI commands are unable to reach the XenServer host.
host-power-on
1 xe host-power-on [host=host_uuid]
Turns on power on XenServer hosts with the Host Power On function enabled. Before using this com‑
mand, enable host-set-power-on on the host.
host-reboot
1 xe host-reboot [host-selector=host_selector_value...]
Reboot the specified XenServer hosts. The specified hosts must be disabled first using the xe host
-disable command, otherwise a HOST_IN_USE error message is displayed.
The hosts on which to perform this operation are selected using the standard selection mechanism
(see host selectors above). Optional arguments can be any number of the host parameters listed at
the beginning of this section.
If the specified XenServer hosts are members of a pool, the loss of connectivity on shutdown is han‑
dled and the pool recovers when the XenServer hosts return. The other members and the pool coor‑
dinator continue to function.
If you shut down the pool coordinator, the pool is out of action until one of the following actions
occurs:
host-restore
Restore a backup named file-name of the XenServer host control software. The use of the word
“restore”here does not mean a full restore in the usual sense, it merely means that the compressed
backup file has been uncompressed and unpacked onto the secondary partition. After you’ve done a
xe host-restore, you have to boot the Install CD and use its Restore from Backup option.
The hosts on which to perform this operation are selected using the standard selection mechanism
(see host selectors above). Optional arguments can be any number of the host parameters listed at
the beginning of this section.
host-send-debug-keys
host-server-certificate-install
1 xe host-server-certificate-install certificate=path_to_certificate_file
private-key=path_to_private_key [certificate-chain=
path_to_chain_file] [host=host_name | uuid=host_uuid]
host-set-hostname-live
Change the host name of the XenServer host specified by host-uuid. This command persistently
sets both the host name in the control domain database and the actual Linux host name of the
XenServer host. The value of host-name is not the same as the value of the name_label field.
host-set-power-on-mode
Use to enable the Host Power On function on XenServer hosts that are compatible with remote power
solutions. When using the host-set-power-on command, you must specify the type of power
management solution on the host (that is, the power‑on‑mode). Then specify configuration options
using the power‑on‑config argument and its associated key‑value pairs.
To use the secrets feature to store your password, specify the key "power_on_password_secret
". For more information, see Secrets.
host-shutdown
1 xe host-shutdown [host-selector=host_selector_value...]
Shut down the specified XenServer hosts. The specified XenServer hosts must be disabled first using
the xe host-disable command, otherwise a HOST_IN_USE error message is displayed.
The hosts on which to perform this operation are selected using the standard selection mechanism
(see host selectors above). Optional arguments can be any number of the host parameters listed at
the beginning of this section.
If the specified XenServer hosts are members of a pool, the loss of connectivity on shutdown is han‑
dled and the pool recovers when the XenServer hosts returns. The other members and the pool coor‑
dinator continue to function.
If you shut down the pool coordinator, the pool is out of action until one of the following actions
occurs:
When the pool coordinator is back online, the members reconnect and synchronize with the
pool coordinator.
If HA is enabled for the pool, one of the members is made into a pool coordinator automatically. If
HA is disabled, you must manually designate the desired XenServer host as pool coordinator with
the pool-designate-new-master command. For more information, see pool‑designate‑new‑
master.
host-sm-dp-destroy
host-sync-data
1 xe host-sync-data
Synchronize the data stored on the pool coordinator with the named host. This does not include the
database data).
host-syslog-reconfigure
1 xe host-syslog-reconfigure [host-selector=host_selector_value...]
Reconfigure the syslog daemon on the specified XenServer hosts. This command applies the con‑
figuration information defined in the host logging parameter.
The hosts on which to perform this operation are selected using the standard selection mechanism
(see host selectors above). Optional arguments can be any number of the host parameters listed at
the beginning of this section.
host-data-source-list
Select the hosts on which to perform this operation by using the standard selection mechanism (see
host selectors). Optional arguments can be any number of the host parameters listed at the beginning
of this section. If no parameters to select hosts are given, the operation is performed on all hosts.
Data sources have two parameters –standard and enabled. This command outputs the values of
the parameters:
• If a data source has enabled set to true, the metrics are currently being recorded to the per‑
formance database.
• If a data source has standard set to true, the metrics are recorded to the performance data‑
base by default. The value of enabled is also set to true for this data source.
• If a data source has standard set to false, the metrics are not recorded to the performance
database by default. The value of enabled is also set to false for this data source.
To start recording data source metrics to the performance database, run the host-data-source-
record command. This command sets enabled to true. To stop, run the host-data-source
-forget. This command sets enabled to false.
host-data-source-record
1 xe host-data-source-record data-source=name_description_of_data_source
[host-selectors=host_selector_value...]
This operation writes the information from the data source to the persistent performance metrics
database of the specified hosts. For performance reasons, this database is distinct from the normal
agent database.
Select the hosts on which to perform this operation by using the standard selection mechanism (see
host selectors). Optional arguments can be any number of the host parameters listed at the beginning
of this section. If no parameters to select hosts are given, the operation is performed on all hosts.
host-data-source-forget
1 xe host-data-source-forget data-source=name_description_of_data_source
[host-selectors=host_selector_value...]
Stop recording the specified data source for a host and forget all of the recorded data.
Select the hosts on which to perform this operation by using the standard selection mechanism (see
host selectors). Optional arguments can be any number of the host parameters listed at the beginning
of this section. If no parameters to select hosts are given, the operation is performed on all hosts.
host-data-source-query
1 xe host-data-source-query data-source=name_description_of_data_source [
host-selectors=host_selector_value...]
Select the hosts on which to perform this operation by using the standard selection mechanism (see
host selectors). Optional arguments can be any number of the host parameters listed at the beginning
of this section. If no parameters to select hosts are given, the operation is performed on all hosts.
Message commands
Commands for working with messages. Messages are created to notify users of significant events, and
are displayed in XenCenter as alerts.
The message objects can be listed with the standard object listing command (xe message-list),
and the parameters manipulated with the standard parameter commands. For more information, see
Low‑level parameter commands
Message parameters
message-create
Creates a message.
message-destroy
1 xe message-destroy [uuid=message_uuid]
Destroys an existing message. You can build a script to destroy all messages. For example:
Network commands
The network objects can be listed with the standard object listing command (xe network-list),
and the parameters manipulated with the standard parameter commands. For more information, see
Low‑level parameter commands
Network parameters
network-create
Creates a network.
network-destroy
1 xe network-destroy uuid=network_uuid
SR‑IOV commands
The network-sriov objects can be listed with the standard object listing command (xe network
-sriov-list), and the parameters manipulated with the standard parameter commands. For
more information, see Low‑level parameter commands
SR‑IOV parameters
network-sriov-create
Creates an SR‑IOV network object for a given physical PIF and enables SR‑IOV on the physical PIF.
network-sriov-destroy
1 xe network-sriov-destroy uuid=network_sriov_uuid
Removes a network SR‑IOV object and disables SR‑IOV on its physical PIF.
Assign an SR‑IOV VF
sdn-controller-forget
sdn-controller-introduce
1 xe sdn-controller-forget uuid=uuid
Tunnel commands
tunnel-create
tunnel-destroy
1 xe tunnel-destroy uuid=uuid
Destroy a tunnel.
Patch commands
patch-apply
patch-clean
1 xe patch-clean uuid=uuid
patch-destroy
1 xe patch-destroy uuid=uuid
patch-pool-apply
1 xe patch-pool-apply uuid=uuid
patch-pool-clean
1 xe patch-pool-clean uuid=uuid
patch-precheck
Run the prechecks contained within the patch previously uploaded to the specified host.
patch-upload
1 xe patch-upload file-name=file_name
PBD commands
Commands for working with PBDs (Physical Block Devices). PBDs are the software objects through
which the XenServer host accesses storage repositories (SRs).
The PBD objects can be listed with the standard object listing command (xe pbd-list), and the
parameters manipulated with the standard parameter commands. For more information, see Low‑
level parameter commands
PBD parameters
pbd-create
Create a PBD on your XenServer host. The read‑only device-config parameter can only be set on
creation.
To add a mapping from ‘path’to ‘/tmp’, ensure that the command line contains the argument
device-config:path=/tmp
For a full list of supported device‑config key/value pairs on each SR type, see Storage.
pbd-destroy
1 xe pbd-destroy uuid=uuid_of_pbd
pbd-plug
1 xe pbd-plug uuid=uuid_of_pbd
Attempts to plug in the PBD to the XenServer host. If this command succeeds, the referenced SR (and
the VDIs contained within) becomes visible to the XenServer host.
pbd-unplug
1 xe pbd-unplug uuid=uuid_of_pbd
PIF commands
Commands for working with PIFs (objects representing the physical network interfaces).
The PIF objects can be listed with the standard object listing command (xe pif-list), and the
parameters manipulated with the standard parameter commands. For more information, see Low‑
level parameter commands
PIF parameters
Note:
Changes made to the other-config fields of a PIF will only take effect after a reboot. Alter‑
nately, use the xe pif-unplug and xe pif-plug commands to cause the PIF configuration
to be rewritten.
pif-forget
1 xe pif-forget uuid=uuid_of_pif
pif-introduce
Create a PIF object representing a physical interface on the specified XenServer host.
pif-plug
1 xe pif-plug uuid=uuid_of_pif
pif-reconfigure-ip
Modify the IP address of the PIF. For static IP configuration, set the mode parameter to static, with
the gateway, IP, and netmask parameters set to the appropriate values. To use DHCP, set the
mode parameter to DHCP and leave the static parameters undefined.
Note:
Using static IP addresses on physical network interfaces connected to a port on a switch using
Spanning Tree Protocol with STP Fast Link turned off (or unsupported) results in a period during
which there is no traffic.
pif-reconfigure-ipv6
pif-scan
1 xe pif-scan host-uuid=host_uuid
pif-set-primary-address-type
pif-unplug
1 xe pif-unplug uuid=uuid_of_pif
Pool commands
Commands for working with pools. A pool is an aggregate of one or more XenServer hosts. A pool
uses one or more shared storage repositories so that the VMs running on one host in the pool can be
migrated in near‑real time to another host in the pool. This migration happens while the VM is still
running, without it needing to be shut down and brought back up.
Each XenServer host is really a pool consisting of a single member by default. When your XenServer
host is joined to a pool, it is designated as a member. If the pool that the host is joined to consists of
a single member, that member becomes the pool coordinator. If the pool that the host is joined to
already has multiple members, one of these members is already the pool coordinator and remains so
when the new host joins the pool.
The singleton pool object can be listed with the standard object listing command (xe pool-list).
Its parameters can be manipulated with the standard parameter commands. For more information,
see Low‑level parameter commands
Pool parameters
pool-apply-edition
pool-certificate-install
1 xe pool-certificate-install filename=file_name
pool-certificate-list
1 xe pool-certificate-list
pool-certificate-sync
1 xe pool-certificate-sync
Sync TLS certificates and certificate revocation lists from pool coordinator to the other pool mem‑
bers.
pool-certificate-uninstall
1 xe pool-certificate-uninstall name=name
pool-crl-install
1 xe pool-crl-install filename=file_name
pool-crl-list
1 xe pool-crl-list
pool-crl-uninstall
1 xe pool-crl-uninstall name=name
pool-deconfigure-wlb
1 xe pool-deconfigure-wlb
pool-designate-new-master
1 xe pool-designate-new-master host-uuid=uuid_of_new_master
Instruct the specified member XenServer host to become the coordinator (formerly called “master”)
of an existing pool. This command performs an orderly handover of the role of pool coordinator to
another host in the resource pool. This command only works when the current pool coordinator is
online. It is not a replacement for the emergency mode commands listed below.
pool-disable-external-auth
pool-disable-local-storage-caching
1 xe pool-disable-local-storage-caching uuid=uuid
pool-disable-redo-log
1 xe pool-disable-redo-log
pool-dump-database
1 xe pool-dump-database file-name=filename_to_dump_database_into_(
on_client)
Download a copy of the entire pool database and dump it into a file on the client.
pool-enable-external-auth
Enables external authentication in all the hosts in a pool. Note that some values of auth-type will
require particular config: values.
pool-enable-local-storage-caching
1 xe pool-enable-local-storage-caching uuid=uuid
pool-enable-redo-log
1 xe pool-ensable-redo-log sr-uuid=sr_uuid
pool-eject
1 xe pool-eject host-uuid=uuid_of_host_to_eject
pool-emergency-reset-master
1 xe pool-emergency-reset-master master-address=address_of_pool_master
Instruct a pool member host to reset its pool coordinator address to the new value and attempt to
connect to it. Do not run this command on pool coordinators.
pool-emergency-transition-to-master
1 xe pool-emergency-transition-to-master
Instruct a member XenServer host to become the pool coordinator (formerly called “the pool mas‑
ter”). The XenServer host accepts this command only after the host has transitioned to emergency
mode. Emergency mode means it is a member of a pool whose coordinator has disappeared from the
network and cannot be contacted after some number of retries.
If the host password has been modified since the host joined the pool, this command can cause the
password of the host to reset. For more information, see (User commands).
pool-ha-enable
1 xe pool-ha-enable heartbeat-sr-uuids=uuid_of_heartbeat_sr
Enable high availability on the resource pool, using the specified SR UUID as the central storage heart‑
beat repository.
pool-ha-disable
1 xe pool-ha-disable
pool-ha-compute-hypothetical-max-host-failures-to-tolerate
Compute the maximum number of host failures to tolerate under the current pool configuration.
pool-ha-compute-max-host-failures-to-tolerate
1 xe pool-ha-compute-hypothetical-max-host-failures-to-tolerate [vm-uuid=
vm_uuid] [restart-priority=restart_priority]
Compute the maximum number of host failures to tolerate with the supplied, proposed protected
VMs.
pool-initialize-wlb
Initialize workload balancing for the current pool with the target Workload Balancing server.
pool-join
pool-management-reconfigure
1 xe pool-management-reconfigure [network-uuid=network-uuid]
Reconfigures the management interface of all the hosts in the pool to use the specified network in‑
terface, which is the interface that is used to connect to the XenCenter. The command rewrites the
MANAGEMENT_INTERFACE key in /etc/xensource-inventory for all the hosts in the pool.
If the device name of an interface (which must have an IP address) is specified, the XenServer pool
coordinator immediately rebinds. This command works both in normal and emergency mode.
From the network UUID specified, UUID of the PIF object is identified and mapped to the XenServer
host, which determines which IP address to rebind to itself. It must not be in emergency mode when
this command is run.
Warning:
Be careful when using this CLI command off‑host and ensure that you have network connectivity
on the new interface. Use xe pif-reconfigure to set one up first. Otherwise, subsequent
CLI commands are unable to reach the XenServer host.
pool-recover-slaves
1 xe pool-recover-slaves
Instruct the pool coordinator to try to reset the address of all members currently running in emergency
mode. This command is typically used after pool-emergency-transition-to-master has
been used to set one of the members as the new pool coordinator.
pool-restore-database
1 xe pool-restore-database file-name=filename_to_restore_from_on_client [
dry-run=true|false]
Upload a database backup (created with pool-dump-database) to a pool. On receiving the up‑
load, the pool coordinator restarts itself with the new database.
There is also a dry run option, which allows you to check that the pool database can be restored with‑
out actually perform the operation. By default, dry-run is set to false.
pool-retrieve-wlb-configuration
1 xe pool-retrieve-wlb-configuration
Retrieves the pool optimization criteria from the Workload Balancing server.
pool-retrieve-wlb-diagnostics
1 xe pool-retrieve-wlb-diagnostics [filename=file_name]
pool-retrieve-wlb-recommendations
1 xe pool-retrieve-wlb-recommendations
Retrieves VM migrate recommendations for the pool from the Workload Balancing server.
pool-retrieve-wlb-report
pool-secret-rotate
1 xe pool-secret-rotate
The pool secret is a secret shared among the XenServer hosts in a pool that enables the host to prove
its membership to a pool. Users with the Pool Admin role can view this secret when connecting to the
host over SSH. Rotate the pool secret if one of these users leaves your organization or loses their Pool
Admin role.
pool-send-test-post
Send the given body to the given host and port, using HTTPS, and print the response. This is used for
debugging the TLS layer.
pool-send-wlb-configuration
1 xe pool-send-wlb-configuration [config:=config]
Sets the pool optimization criteria for the Workload Balancing server.
pool-sync-database
1 xe pool-sync-database
Force the pool database to be synchronized across all hosts in the resource pool. This command is
not necessary in normal operation since the database is regularly automatically replicated. However,
the command can be useful for ensuring changes are rapidly replicated after performing a significant
set of CLI operations.
Set https-only
Enables or disables the blocking of port 80 on the management interface of XenServer hosts.
pvs-cache-storage-create
pvs-cache-storage-destroy
1 xe pvs-cache-storage-destroy uuid=uuid
pvs-proxy-create
pvs-proxy-destroy
1 xe pvs-proxy-destroy uuid=uuid
pvs-server-forget
1 xe pvs-server-forget uuid=uuid
pvs-server-introduce
pvs-site-forget
1 xe pvs-site-forget uuid=uuid
pvs-site-introduce
The storage manager objects can be listed with the standard object listing command (xe sm-list).
The parameters can be manipulated with the standard parameter commands. For more information,
see Low‑level parameter commands
SM parameters
Snapshot commands
snapshot-clone
Create a new template by cloning an existing snapshot, using storage‑level fast disk clone operation
where available.
snapshot-copy
Create a new template by copying an existing VM, but without using storage‑level fast disk clone op‑
eration (even if this is available). The disk images of the copied VM are guaranteed to be ‘full images’
‑ i.e. not part of a CoW chain.
snapshot-destroy
Destroy a snapshot. This leaves the storage associated with the snapshot intact. To delete storage
too, use snapshot‑uninstall.
snapshot-disk-list
snapshot-export-to-template
snapshot-reset-powerstate
Force the VM power state to halted in the management toolstack database only. This command is
used to recover a snapshot that is marked as ‘suspended’. This is a potentially dangerous operation:
you must ensure that you do not need the memory image anymore. You will not be able to resume
your snapshot anymore.
snapshot-revert
snapshot-uninstall
Uninstall a snapshot. This operation will destroy those VDIs that are marked RW and connected to this
snapshot only. To simply destroy the VM record, use snapshot‑destroy.
SR commands
The SR objects can be listed with the standard object listing command (xe sr-list), and the para‑
meters manipulated with the standard parameter commands. For more information, see Low‑level
parameter commands
SR parameters
sr-create
Creates an SR on the disk, introduces it into the database, and creates a PBD attaching the SR to the
XenServer host. If shared is set to true, a PBD is created for each XenServer host in the pool. If
shared is not specified or set to false, a PBD is created only for the XenServer host specified with
host-uuid.
The exact device-config parameters differ depending on the device type. For details of these
parameters across the different storage back‑ends, see Create an SR.
sr-data-source-forget
1 xe sr-data-source-forget data-source=data_source
Stop recording the specified data source for a SR, and forget all of the recorded data.
sr-data-source-list
1 xe sr-data-source-list
sr-data-source-query
1 xe sr-data-source-query data-source=data_source
sr-data-source-record
1 xe sr-data-source-record data-source=data_source
sr-destroy
1 xe sr-destroy uuid=sr_uuid
sr-enable-database-replication
1 xe sr-enable-database-replication uuid=sr_uuid
sr-disable-database-replication
1 xe sr-disable-database-replication uuid=sr_uuid
sr-forget
1 xe sr-forget uuid=sr_uuid
The XAPI agent forgets about a specified SR on the XenServer host. When the XAPI agent forgets an
SR, the SR is detached and you cannot access VDIs on it, but it remains intact on the source media (the
data is not lost).
sr-introduce
Just places an SR record into the database. Use device-config to specify additional parameters
in the form device-config:parameter_key=parameter_value, for example:
1 xe sr-introduce device-config:device=/dev/sdb1
Note:
This command is never used in normal operation. This advanced operation might be useful when
an SR must be reconfigured as shared after it was created or to help recover from various failure
scenarios.
sr-probe
Performs a scan of the backend, using the provided device-config keys. If the device-config
is complete for the SR back‑end, this command returns a list of the SRs present on the device, if any. If
the device-config parameters are only partial, a back‑end‑specific scan is performed, returning
results that guide you in improving the remaining device-config parameters. The scan results
are returned as XML specific to the back end, printed on the CLI.
The exact device-config parameters differ depending on the device type. For details of these
parameters across the different storage back‑ends, see Storage.
sr-probe-ext
Perform a storage probe. The device‑config parameters can be specified by for example device‑
config:devs=/dev/sdb1. Unlike sr‑probe, this command returns results in the same human‑readable
format for every SR type.
sr-scan
1 xe sr-scan uuid=sr_uuid
Force an SR scan, syncing the XAPI database with VDIs present in the underlying storage substrate.
sr-update
1 xe sr-update uuid=uuid
lvhd-enable-thin-provisioning
Subject commands
session-subject-identifier-list
1 xe session-subject-identifier-list
Return a list of all the user subject ids of all externally‑authenticated existing sessions.
session-subject-identifier-logout
1 xe session-subject-identifier-logout subject-identifier=
subject_identifier
session-subject-identifier-logout-all
1 xe session-subject-identifier-logout-all
subject-add
1 xe subject-add subject-name=subject_name
Add a subject to the list of subjects that can access the pool.
subject-remove
1 xe subject-remove subject-uuid=subject_uuid
Remove a subject from the list of subjects that can access the pool.
subject-role-add
subject-role-remove
secret-create
1 xe secret-create value=value
Create a secret.
secret-destroy
1 xe secret-destroy uuid=uuid
Destroy a secret.
Task commands
Commands for working with long‑running asynchronous tasks. These commands are tasks such as
starting, stopping, and suspending a virtual machine. The tasks are typically made up of a set of other
atomic subtasks that together accomplish the requested operation.
The task objects can be listed with the standard object listing command (xe task-list), and the
parameters manipulated with the standard parameter commands. For more information, see Low‑
level parameter commands
Task parameters
task-cancel
1 xe task-cancel [uuid=task_uuid]
Template commands
Templates are essentially VMs with the is-a-template parameter set to true. A template is a
“gold image”that contains all the various configuration settings to instantiate a specific VM. XenServer
ships with a base set of templates, which are generic “raw”VMs that can boot an OS vendor installa‑
tion CD (for example: RHEL, CentOS, SLES, Windows). You can create VMs, configure them in standard
forms for your particular needs, and save a copy of them as templates for future use in VM deploy‑
ment.
The template objects can be listed with the standard object listing command (xe template-list
), and the parameters manipulated with the standard parameter commands. For more information,
see Low‑level parameter commands
Note:
Templates cannot be directly converted into VMs by setting the is-a-template parameter to
false. Setting is-a-template parameter to false is not supported and results in a VM
that cannot be started.
VM template parameters
• uuid (read only) the unique identifier/object reference for the template
• user-version (read/write) string for creators of VMs and templates to put version informa‑
tion
• is-control-domain (read only) true if this is a control domain (domain 0 or a driver do‑
main)
• power-state (read only) current power state. The value is always halted for a template
• suspend-VDI-uuid (read only) the VDI that a suspend image is stored on (has no meaning
for a template)
• VCPUs-params (read/write map parameter) configuration parameters for the selected vCPU
policy.
You can also tune the vCPU priority (xen scheduling) with the cap and weight parameters. For
example:
A VM based on this template with a weight of 512 get twice as much CPU as a domain with a
weight of 256 on a contended host. Legal weights range from 1 to 65535 and the default is 256.
The cap optionally fixes the maximum amount of CPU a VM based on this template can con‑
sume, even if the XenServer host has idle CPU cycles. The cap is expressed in percentage of one
physical CPU: 100 is 1 physical CPU, 50 is half a CPU, 400 is 4 CPUs, and so on The default, 0,
means that there is no upper cap.
• VCPUs-max (read/write) maximum number of vCPUs
• VCPUs-at-startup (read/write) boot number of vCPUs
• actions-after-crash (read/write) action to take when a VM based on this template
crashes
• console-uuids (read only set parameter) virtual console devices
• platform (read/write map parameter) platform specific configuration
To disable the emulation of a parallel port for guests:
• allowed-operations (read only set parameter) list of the operations allowed in this state
• current-operations (read only set parameter) list of the operations that are currently in
progress on this template
• allowed-VBD-devices (read only set parameter) list of VBD identifiers available for use,
represented by integers of the range 0–15. This list is informational only, and other devices may
be used (but may not work).
• allowed-VIF-devices (read only set parameter) list of VIF identifiers available for use, rep‑
resented by integers of the range 0–15. This list is informational only, and other devices may be
used (but may not work).
• HVM-boot-policy (read/write) the boot policy for guests. Either BIOS Order or an empty
string.
• HVM-boot-params (read/write map parameter) the order key controls the guest boot order,
represented as a string where each character is a boot method: d for the CD/DVD, c for the root
disk, and n for network PXE boot. The default is dc.
• PV-legacy-args (read/write) string of arguments to make legacy VMs based on this tem‑
plate boot
• last-boot-CPU-flags (read only) describes the CPU flags on which a VM based on this
template was last booted; not populated for a template
• resident-on (read only) the XenServer host on which a VM based on this template is resident.
Appears as not in database for a template
• affinity (read/write) the XenServer host which a VM based on this template has preference
for running on. Used by the xe vm-start command to decide where to run the VM
• other-config (read/write map parameter) list of key/value pairs that specify extra configu‑
ration parameters for the template
• start-time (read only) timestamp of the date and time that the metrics for a VM based on
this template were read, in the form yyyymmddThh:mm:ss z, where z is the single‑letter mil‑
itary timezone indicator, for example, Z for UTC(GMT). Set to 1 Jan 1970 Z (beginning of
Unix/POSIX epoch) for a template
• install-time (read only) timestamp of the date and time that the metrics for a VM based
on this template were read, in the form yyyymmddThh:mm:ss z, where z is the single‑letter
military timezone indicator, for example, Z for UTC (GMT). Set to 1 Jan 1970 Z (beginning
of Unix/POSIX epoch) for a template
• memory-actual (read only) the actual memory being used by a VM based on this template;
0 for a template
• VCPUs-number (read only) the number of virtual CPUs assigned to a VM based on this tem‑
plate; 0 for a template
• VCPUs-Utilization (read only map parameter) list of virtual CPUs and their weight read
only map parameter os-version the version of the operating system for a VM based on this
template. Appears as not in database for a template
• PV-drivers-version (read only map parameter) the versions of the paravirtualized drivers
for a VM based on this template. Appears as not in database for a template
• PV-drivers-detected (read only) flag for latest version of the paravirtualized drivers for a
VM based on this template. Appears as not in database for a template
• memory (read only map parameter) memory metrics reported by the agent on a VM based on
this template. Appears as not in database for a template
• disks (read only map parameter) disk metrics reported by the agent on a VM based on this
template. Appears as not in database for a template
• networks (read only map parameter) network metrics reported by the agent on a VM based
on this template. Appears as not in database for a template
• other (read only map parameter) other metrics reported by the agent on a VM based on this
template. Appears as not in database for a template
• possible-hosts (read only) list of hosts that can potentially host the VM
• recommendations (read only) XML specification of recommended values and ranges for
properties of this VM
• xenstore-data (read/write map parameter) data to be inserted into the xenstore tree (/
local/domain/*domid*/vmdata) after the VM is created.
• snapshot_of (read only) the UUID of the VM that this template is a snapshot of
• snapshots (read only) the UUIDs of any snapshots that have been taken of this template
• snapshot_time (read only) the timestamp of the most recent VM snapshot taken
• memory-target (read only) the target amount of memory set for this template
• blocked-operations (read/write map parameter) lists the operations that cannot be per‑
formed on this template
• last-boot-record (read only) record of the last boot parameters for this template, in XML
format
• ha-restart-priority (read only) restart or best‑effort read/write blobs binary data store
template-export
Exports a copy of a specified template to a file with the specified new file name.
template-uninstall
Uninstall a custom template. This operation will destroy those VDIs that are marked as ‘owned’by this
template.
Update commands
The update objects can be listed with the standard object listing command (xe update-list), and
the parameters manipulated with the standard parameter commands. For more information, see Low‑
level parameter commands
Update parameters
update-upload
1 xe update-upload file-name=update_filename
Upload a specified update file to the XenServer host. This command prepares an update to be applied.
On success, the UUID of the uploaded update is printed. If the update has previously been uploaded,
UPDATE_ALREADY_EXISTS error is returned instead and the patch is not uploaded again.
update-precheck
Run the prechecks contained within the specified update on the specified XenServer host.
update-destroy
1 xe update-destroy uuid=update_file_uuid
Deletes an update file that has not been applied from the pool. Can be used to delete an update file
that cannot be applied to the hosts.
update-apply
update-pool-apply
1 xe update-pool-apply uuid=update_uuid
update-introduce
1 xe update-introduce vdi-uuid=vdi_uuid
update-pool-clean
1 xe update-pool-clean uuid=uuid
User commands
user-password-change
Changes the password of the logged‑in user. The old password field is not checked because you re‑
quire supervisor privilege to use this command.
VBD commands
A VBD is a software object that connects a VM to the VDI, which represents the contents of the virtual
disk. The VBD has the attributes which tie the VDI to the VM (is it bootable, its read/write metrics, and
so on). The VDI has the information on the physical attributes of the virtual disk (which type of SR,
whether the disk is sharable, whether the media is read/write or read only, and so on).
The VBD objects can be listed with the standard object listing command (xe vbd-list), and the
parameters manipulated with the standard parameter commands. For more information, see Low‑
level parameter commands
VBD parameters
vbd-create
The allowable values for the device field are integers 0–15, and the number must be unique for
each VM. The current allowable values can be seen in the allowed-VBD-devices parameter on
the specified VM. This is seen as userdevice in the vbd parameters.
If the type is CD, vdi-uuid is optional. If no VDI is specified, an empty VBD is created for the CD.
Mode must be RO for a CD.
vbd-destroy
1 xe vbd-destroy uuid=uuid_of_vbd
If the VBD has its other-config:owner parameter set to true, the associated VDI is also de‑
stroyed.
vbd-eject
1 xe vbd-eject uuid=uuid_of_vbd
Remove the media from the drive represented by a VBD. This command only works if the media is of a
removable type (a physical CD or an ISO). Otherwise, an error message VBD_NOT_REMOVABLE_MEDIA
is returned.
vbd-insert
Insert new media into the drive represented by a VBD. This command only works if the media is of a re‑
movable type (a physical CD or an ISO). Otherwise, an error message VBD_NOT_REMOVABLE_MEDIA
is returned.
vbd-plug
1 xe vbd-plug uuid=uuid_of_vbd
vbd-unplug
1 xe vbd-unplug uuid=uuid_of_vbd
Attempts to detach the VBD from the VM while it is in the running state.
VDI commands
A VDI is a software object that represents the contents of the virtual disk seen by a VM. This is different
to the VBD, which is an object that ties a VM to the VDI. The VDI has the information on the physical
attributes of the virtual disk (which type of SR, whether the disk is sharable, whether the media is
read/write or read only, and so on). The VBD has the attributes that tie the VDI to the VM (is it bootable,
its read/write metrics, and so on).
The VDI objects can be listed with the standard object listing command (xe vdi-list), and the
parameters manipulated with the standard parameter commands. For more information, see Low‑
level parameter commands
VDI parameters
vdi-clone
Create a new, writable copy of the specified VDI that can be used directly. It is a variant of vdi-copy
that is can expose high‑speed image clone facilities where they exist.
Use the optional driver-params map parameter to pass extra vendor‑specific configuration infor‑
mation to the back‑end storage driver that the VDI is based on. For more information, see the storage
vendor driver documentation.
vdi-copy
vdi-create
Create a VDI.
The virtual-size parameter can be specified in bytes or using the IEC standard suffixes KiB, MiB,
GiB, and TiB.
Note:
SR types that support thin provisioning of disks (such as Local VHD and NFS) do not enforce vir‑
tual allocation of disks. Take great care when over‑allocating virtual disk space on an SR. If an
over‑allocated SR becomes full, disk space must be made available either on the SR target sub‑
strate or by deleting unused VDIs in the SR.
Some SR types might round up the virtual-size value to make it divisible by a configured
block size.
vdi-data-destroy
1 xe vdi-data-destroy uuid=uuid_of_vdi
Destroy the data associated with the specified VDI, but keep the changed block tracking metadata.
Note:
If you use changed block tracking to take incremental backups of the VDI, ensure that you use
the vdi-data-destroy command to delete snapshots but keep the metadata. Do not use
vdi-destroy on snapshots of VDIs that have changed block tracking enabled.
vdi-destroy
1 xe vdi-destroy uuid=uuid_of_vdi
Note:
If you use changed block tracking to take incremental backups of the VDI, ensure that you use
the vdi-data-destroy command to delete snapshots but keep the metadata. Do not use
vdi-destroy on snapshots of VDIs that have changed block tracking enabled.
For Local VHD and NFS SR types, disk space is not immediately released on vdi-destroy, but
periodically during a storage repository scan operation. If you must force deleted disk space to
be made available, call sr-scan manually.
vdi-disable-cbt
1 xe vdi-disable-cbt uuid=uuid_of_vdi
vdi-enable-cbt
1 xe vdi-enable-cbt uuid=uuid_of_vdi
Note:
You can enable changed block tracking only on licensed instances of XenServer Premium Edition.
vdi-export
Export a VDI to the specified file name. You can export a VDI in one of the following formats:
• raw
• vhd
The VHD format can be sparse. If there are unallocated blocks within the VDI, these blocks might be
omitted from the VHD file, therefore making the VHD file smaller. You can export to VHD format from
all supported VHD‑based storage types (EXT3/EXT4, NFS).
If you specify the base parameter, this command exports only those blocks that have changed be‑
tween the exported VDI and the base VDI.
vdi-forget
1 xe vdi-forget uuid=uuid_of_vdi
Unconditionally removes a VDI record from the database without touching the storage back‑end. In
normal operation, use vdi-destroy instead.
vdi-import
Import a VDI. You can import a VDI from one of the following formats:
• raw
• vhd
vdi-introduce
Create a VDI object representing an existing storage device, without actually modifying or creating
any storage. This command is primarily used internally to introduce hot‑plugged storage devices au‑
tomatically.
vdi-list-changed-blocks
Compare two VDIs and return the list of blocks that have changed between the two as a base64‑
encoded string. This command works only for VDIs that have changed block tracking enabled.
vdi-pool-migrate
Migrate a VDI to a specified SR, while the VDI is attached to a running guest. (Storage live migration)
vdi-resize
vdi-snapshot
Produces a read‑write version of a VDI that can be used as a reference for backup or template creation
purposes or both. Use the snapshot to perform a backup rather than installing and running backup
software inside the VM. The VM continues running while external backup software streams the con‑
tents of the snapshot to the backup media. Similarly, a snapshot can be used as a “gold image”on
which to base a template. A template can be made using any VDIs.
Use the optional driver-params map parameter to pass extra vendor‑specific configuration infor‑
mation to the back‑end storage driver that the VDI is based on. For more information, see the storage
vendor driver documentation.
vdi-unlock
Attempts to unlock the specified VDIs. If force=true is passed to the command, it forces the un‑
locking operation.
vdi-update
1 xe vdi-update uuid=uuid
VIF commands
The VIF objects can be listed with the standard object listing command (xe vif-list), and the
parameters manipulated with the standard parameter commands. For more information, see Low‑
level parameter commands
VIF parameters
• uuid (read only) the unique identifier/object reference for the VIF
• vm-uuid (read only) the unique identifier/object reference for the VM that this VIF resides on
• vm-name-label (read only) the name of the VM that this VIF resides on
• allowed-operations (read only set parameter) a list of the operations allowed in this state
• current-operations (read only set parameter) a list of the operations that are currently in
progress on this VIF
• device (read only) integer label of this VIF, indicating the order in which VIF back‑ends were
created
• MAC (read only) MAC address of VIF, as exposed to the VM
• MTU (read only) Maximum Transmission Unit of the VIF in bytes.
This parameter is read‑only, but you can override the MTU setting with the mtu key using the
other-config map parameter. For example, to reset the MTU on a virtual NIC to use jumbo
frames:
1 xe vif-param-set \
2 uuid=<vif_uuid> \
3 other-config:mtu=9000
• network-uuid (read only) the unique identifier/object reference of the virtual network to
which this VIF is connected
• network-name-label (read only) the descriptive name of the virtual network to which this
VIF is connected
• io_read_kbs (read only) average read rate in kB/s for this VIF
• io_write_kbs (read only) average write rate in kB/s for this VIF
• locking_mode (read/write) Affects the VIFs ability to filter traffic to/from a list of MAC and IP
addresses. Requires extra parameters.
• locking_mode:default (read/write) Varies according to the default locking mode for the
VIF network.
If the default‑locking‑mode is set to disabled, XenServer applies a filtering rule so that the
VIF cannot send or receive traffic. If the default‑lockingmode is set to unlocked, XenServer
removes all the filtering rules associated with the VIF. For more information, see Network Com‑
mands.
• locking_mode:locked (read/write) Only traffic sent to or sent from the specified MAC and
IP addresses is allowed on the VIF. If no IP addresses are specified, no traffic is allowed.
vif-create
Appropriate values for the device field are listed in the parameter allowed-VIF-devices on
the specified VM. Before any VIFs exist there, the values allowed are integers from 0‑15.
The mac parameter is the standard MAC address in the form aa:bb:cc:dd:ee:ff. If you leave it
unspecified, an appropriate random MAC address is created. You can also explicitly set a random MAC
address by specifying mac=random.
vif-destroy
1 xe vif-destroy uuid=uuid_of_vif
Destroy a VIF.
vif-move
vif-plug
1 xe vif-plug uuid=uuid_of_vif
vif-unplug
1 xe vif-unplug uuid=uuid_of_vif
vif-configure-ipv4
Configure IPv4 settings for this virtual interface. Set IPv4 settings as below:
For example:
vif-configure-ipv6
Configure IPv6 settings for this virtual interface. Set IPv6 settings as below:
For example:
1 VIF.configure_ipv6(vifObject,"static", "fd06:7768:b9e5:8b00::5001/64",
"fd06:7768:b9e5:8b00::1")
VLAN commands
Commands for working with VLANs (virtual networks). To list and edit virtual interfaces, refer to the
PIF commands, which have a VLAN parameter to signal that they have an associated virtual network.
For more information, see PIF commands. For example, to list VLANs, use xe pif-list.
vlan-create
pool-vlan-create
Create a VLAN on all hosts on a pool, by determining which interface (for example, eth0) the specified
network is on (on each host) and creating and plugging a new PIF object one each host accordingly.
vlan-destroy
1 xe vlan-destroy uuid=uuid_of_pif_mapped_to_vlan
Destroy a VLAN. Requires the UUID of the PIF that represents the VLAN.
VM commands
VM selectors
Several of the commands listed here have a common mechanism for selecting one or more VMs on
which to perform the operation. The simplest way is by supplying the argument vm=name_or_uuid.
An easy way to get the uuid of an actual VM is to, for example, run xe vm-list power-state
=running. (Get the full list of fields that can be matched by using the command xe vm-list
params=all. ) For example, specifying power-state=halted selects VMs whose power-
state parameter is equal to halted. Where multiple VMs are matching, specify the option --
multiple to perform the operation. The full list of parameters that can be matched is described
at the beginning of this section.
The VM objects can be listed with the standard object listing command (xe vm-list), and the pa‑
rameters manipulated with the standard parameter commands. For more information, see Low‑level
parameter commands
VM parameters
All writable VM parameter values can be changed while the VM is running, but new parameters
are not applied dynamically and cannot be applied until the VM is rebooted.
• is-control-domain (read only) True if this is a control domain (domain 0 or a driver do‑
main)
• start-delay (read/write) the delay to wait before a call to start up the VM returns in seconds
• shutdown-delay (read/write) the delay to wait before a call to shut down the VM returns in
seconds
• VCPUs-params (read/write map parameter) configuration parameters for the selected vCPU
policy.
A VM with a weight of 512 get twice as much CPU as a domain with a weight of 256 on a con‑
tended XenServer host. Legal weights range from 1 to 65535 and the default is 256. The cap op‑
tionally fixes the maximum amount of CPU a VM will be able to consume, even if the XenServer
host has idle CPU cycles. The cap is expressed in percentage of one physical CPU: 100 is 1 phys‑
ical CPU, 50 is half a CPU, 400 is 4 CPUs, and so on The default, 0, means that there is no upper
cap.
• allowed-operations (read only set parameter) list of the operations allowed in this state
• current-operations (read only set parameter) a list of the operations that are currently in
progress on the VM
• allowed-VBD-devices (read only set parameter) list of VBD identifiers available for use,
represented by integers of the range 0–15. This list is informational only, and other devices may
be used (but might not work).
• allowed-VIF-devices (read only set parameter) list of VIF identifiers available for use, rep‑
resented by integers of the range 0–15. This list is informational only, and other devices may be
used (but might not work).
• HVM-boot-policy (read/write) the boot policy for guests. Either BIOS Order or an empty
string.
• HVM-boot-params (read/write map parameter) the order key controls the guest boot order,
represented as a string where each character is a boot method: d for the CD/DVD, c for the root
disk, and n for network PXE boot. The default is dc.
• last-boot-CPU-flags (read only) describes the CPU flags on which the VM was last booted
• affinity (read/write) The XenServer host which the VM has preference for running on. Used
by the xe vm-start command to decide where to run the VM
• other-config (read/write map parameter) A list of key/value pairs that specify extra config‑
uration parameters for the VM.
For example, the other-config key/value pair auto_poweron: true requests to start
the VM automatically after any host in the pool boots. You must also set this parameter in
your pool’s other-config. These parameters are now deprecated. Use the ha-restart-
priority parameter instead.
• start-time (read only) timestamp of the date and time that the metrics for the VM were read.
This timestamp is in the form yyyymmddThh:mm:ss z, where z is the single letter military
timezone indicator, for example, Z for UTC (GMT)
• install-time (read only) timestamp of the date and time that the metrics for the VM were
read. This timestamp is in the form yyyymmddThh:mm:ss z, where z is the single letter mil‑
itary timezone indicator, for example, Z for UTC (GMT)
• VCPUs-number (read only) the number of virtual CPUs assigned to the VM for a Linux VM. This
number can differ from VCPUS-max and can be changed without rebooting the VM using the
vm-vcpu-hotplug command. For more information, see vm-vcpu-hotplug. Windows
VMs always run with the number of vCPUs set to VCPUsmax and must be rebooted to change
this value. Performance drops sharply when you set VCPUs-number to a value greater than
the number of physical CPUs on the XenServer host.
• VCPUs-Utilization (read only map parameter) a list of virtual CPUs and their weight
• os-version (read only map parameter) the version of the operating system for the VM
• PV-drivers-version (read only map parameter) the versions of the paravirtualized drivers
for the VM
• PV-drivers-detected (read only) flag for latest version of the paravirtualized drivers for
the VM
• memory (read only map parameter) memory metrics reported by the agent on the VM
• disks (read only map parameter) disk metrics reported by the agent on the VM
• networks (read only map parameter) network metrics reported by the agent on the VM
• other (read only map parameter) other metrics reported by the agent on the VM
• recommendations (read only) XML specification of recommended values and ranges for
properties of this VM
• xenstore-data (read/write map parameter) data to be inserted into the xenstore tree (/
local/domain/*domid*/vm-data) after the VM is created
• snapshot_time (read only) the timestamp of the snapshot operation that created this VM
snapshot
• memory-target (read only) the target amount of memory set for this VM
• blocked-operations (read/write map parameter) lists the operations that cannot be per‑
formed on this VM
• last-boot-record (read only) record of the last boot parameters for this template, in XML
format
• live (read only) True if the VM is running. False if HA suspects that the VM is not be running.
vm-assert-can-be-recovered
vm-call-plugin
Calls the function within the plug‑in on the given VM with optional arguments (args:key=value).
To pass a ”value” string with special characters in it (for example new line), an alternative syntax
args:key:file=local_file can be used in place, where the content of local_file will be retrieved and
assigned to ”key” as a whole.
vm-cd-add
Add a new virtual CD to the selected VM. Select the device parameter from the value of the allowed
-VBD-devices parameter of the VM.
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-cd-eject
1 xe vm-cd-eject [vm-selector=vm_selector_value...]
Eject a CD from the virtual CD drive. This command only works if exactly one CD is attached to the
VM. When there are two or more CDs, use the command xe vbd-eject and specify the UUID of the
VBD.
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-cd-insert
Insert a CD into the virtual CD drive. This command only works if there is exactly one empty CD de‑
vice attached to the VM. When there are two or more empty CD devices, use the xe vbd-insert
command and specify the UUIDs of the VBD and of the VDI to insert.
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-cd-list
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
You can also select which VBD and VDI parameters to list.
vm-cd-remove
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-checkpoint
Checkpoint an existing VM, using storage‑level fast disk snapshot operation where available.
vm-clone
Clone an existing VM, using storage‑level fast disk clone operation where available. Specify the name
and the optional description for the resulting cloned VM using the new-name-label and new-
name-description arguments.
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-compute-maximum-memory
1 xe vm-compute-maximum-memory total=
amount_of_available_physical_ram_in_bytes [approximate=add overhead
memory for additional vCPUS? true|false] [vm_selector=
vm_selector_value...]
Calculate the maximum amount of static memory which can be allocated to an existing VM, using the
total amount of physical RAM as an upper bound. The optional parameter approximate reserves
sufficient extra memory in the calculation to account for adding extra vCPUs into the VM later.
For example:
This command uses the value of the memory-free parameter returned by the xe host-list
command to set the maximum memory of the VM named testvm.
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-compute-memory-overhead
1 xe vm-compute-memory-overhead
vm-copy
Copy an existing VM, but without using storage‑level fast disk clone operation (even if this option is
available). The disk images of the copied VM are guaranteed to be full images, that is, not part of a
copy‑on‑write (CoW) chain.
Specify the name and the optional description for the resulting copied VM using the new-name-
label and new-name-description arguments.
Specify the destination SR for the resulting copied VM using the sr-uuid. If this parameter is not
specified, the destination is the same SR that the original VM is in.
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-copy-bios-strings
1 xe vm-copy-bios-strings host-uuid=host_uuid
Note:
After you first start a VM, you cannot change its BIOS strings. Ensure that the BIOS strings are
correct before starting the VM for the first time.
vm-crashdump-list
When you use the optional argument params, the value of params is a string containing a list of pa‑
rameters of this object that you want to display. Alternatively, you can use the keyword all to show
all parameters. If params is not used, the returned list shows a default subset of all available para‑
meters.
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-data-source-list
Select the VMs on which to perform this operation by using the standard selection mechanism. For
more information, see VM selectors. Optional arguments can be any number of the VM parameters
listed at the beginning of this section. If no parameters to select hosts are given, the operation is
performed on all VMs.
Data sources have two parameters –standard and enabled –which you can seen in the output of
this command. If a data source has enabled set to true, the metrics are currently being recorded
to the performance database. If a data source has standard set to true, the metrics are recorded
to the performance database by default (and enabled is also set to true for this data source). If a
data source has standard set to false, the metrics are not recorded to the performance database
by default (and enabled is also set to false for this data source).
To start recording data source metrics to the performance database, run the vm-data-source-
record command. This command sets enabled to true. To stop, run the vm-data-source-
forget. This command sets enabled to false.
vm-data-source-record
1 xe vm-data-source-record data-source=name_description_of_data-source [
vm-selector=vm selector value...]
This operation writes the information from the data source to the persistent performance metrics
database of the specified VMs. For performance reasons, this database is distinct from the normal
agent database.
Select the VMs on which to perform this operation by using the standard selection mechanism. For
more information, see VM selectors. Optional arguments can be any number of the VM parameters
listed at the beginning of this section. If no parameters to select hosts are given, the operation is
performed on all VMs.
vm-data-source-forget
1 xe vm-data-source-forget data-source=name_description_of_data-source [
vm-selector=vm selector value...]
Stop recording the specified data source for a VM and forget all of the recorded data.
Select the VMs on which to perform this operation by using the standard selection mechanism. For
more information, see VM selectors. Optional arguments can be any number of the VM parameters
listed at the beginning of this section. If no parameters to select hosts are given, the operation is
performed on all VMs.
vm-data-source-query
Select the VMs on which to perform this operation by using the standard selection mechanism. For
more information, see VM selectors. Optional arguments can be any number of the VM parameters
listed at the beginning of this section. If no parameters to select hosts are given, the operation is
performed on all VMs.
vm-destroy
1 xe vm-destroy uuid=uuid_of_vm
Destroy the specified VM. This leaves the storage associated with the VM intact. To delete storage as
well, use xe vm-uninstall.
vm-disk-add
Add a disk to the specified VMs. Select the device parameter from the value of the allowed-VBD
-devices parameter of the VMs.
The disk-size parameter can be specified in bytes or using the IEC standard suffixes KiB, MiB, GiB,
and TiB.
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-disk-list
Lists disks attached to the specified VMs. The vbd-params and vdi-params parameters control
the fields of the respective objects to output. Give the parameters as a comma‑separated list, or the
special key all for the complete list.
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-disk-remove
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-export
Export the specified VMs (including disk images) to a file on the local machine. Specify the file name
to export the VM into using the filename parameter. By convention, the file name has a .xva ex‑
tension.
If the metadata parameter is true, the disks are not exported. Only the VM metadata is written to
the output file. Use this parameter when the underlying storage is transferred through other mecha‑
nisms, and permits the VM information to be recreated. For more information, see vm-import.
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-import
Import a VM from a previously exported file. If preserve is set to true, the MAC address of the
original VM is preserved. The sr-uuid determines the destination SR to import the VM into. If this
parameter is not specified, the default SR is used.
If the metadata is true, you can import a previously exported set of metadata without their asso‑
ciated disk blocks. Metadata‑only import fails if any VDIs cannot be found (named by SR and VDI.
location) unless the --force option is specified, in which case the import proceeds regardless.
If disks can be mirrored or moved out‑of‑band, metadata import/export is a fast way of moving VMs
between disjoint pools. For example, as part of a disaster recovery plan.
Note:
vm-install
Install or clone a VM from a template. Specify the template name using either the template-uuid
or template argument. Specify an SR using either the sr-uuid or sr-name-label argument.
Specify to install BIOS‑locked media using the copy-bios-strings-from argument.
Note:
When installing from a template that has existing disks, by default, new disks are created in the
same SR as these existing disks. Where the SR supports it, these disks are fast copies. If a different
SR is specified on the command line, the new disks are created there. In this case, a fast copy is
not possible and the disks are full copies.
When installing from a template that doesn’t have existing disks, any new disks are created in
the SR specified, or the pool default SR when an SR is not specified.
vm-is-bios-customized
1 xe vm-is-bios-customized
vm-memory-dynamic-range-set
Configure the dynamic memory range of a VM. The dynamic memory range defines soft lower and
upper limits for a VM’s memory. It’s possible to change these fields when a VM is running or halted.
The dynamic range must fit within the static range.
vm-memory-limits-set
vm-memory-set
1 xe vm-memory-set memory=memory
vm-memory-shadow-multiplier-set
1 xe vm-memory-shadow-multiplier-set [vm-selector=vm_selector_value...] [
multiplier=float_memory_multiplier]
This is an advanced option which modifies the amount of shadow memory assigned to a hardware‑
assisted VM.
In some specialized application workloads, such as Citrix Virtual Apps, extra shadow memory is re‑
quired to achieve full performance.
This memory is considered to be an overhead. It is separated from the normal memory calculations
for accounting memory to a VM. When this command is invoked, the amount of free host memory
decreases according to the multiplier and the HVM_shadow_multiplier field is updated with the
value that Xen has assigned to the VM. If there is not enough XenServer host memory free, an error is
returned.
The VMs on which to perform this operation are selected using the standard selection mechanism. For
more information, see VM selectors.
vm-memory-static-range-set
Configure the static memory range of a VM. The static memory range defines hard lower and upper
limits for a VM’s memory. It’s possible to change these fields only when a VM is halted. The static
range must encompass the dynamic range.
vm-memory-target-set
1 xe vm-memory-target-set target=target
Set the memory target for a halted or running VM. The given value must be within the range defined
by the VM’s memory_static_min and memory_static_max values.
vm-migrate
The compress parameter overrides the migration-compression pool parameter for xe pool
-param-set.
The host parameter in the vm-migrate command can be either the name or the UUID of the
XenServer host. For example, to migrate the VM to another host in the pool, where the VM disks are
on storage shared by both hosts:
To move VMs between hosts in the same pool that do not share storage (storage live migration):
For storage live migration, you must provide the host name or IP address, user name, and password
for the pool coordinator, even when you are migrating within the same pool.
3 vdi:vdi_2=destination_sr2_uuid \
4 vdi:vdi_3=destination_sr3_uuid
Additionally, you can choose which network to attach the VM after migration:
1 xe vm-migrate uuid=vm_uuid \
2 vdi1:vdi_1_uuid=destination_sr1_uuid \
3 vdi2:vdi_2_uuid=destination_sr2_uuid \
4 vdi3:vdi_3_uuid=destination_sr3_uuid \
5 vif:source_vif_uuid=destination_network_uuid
For more information about storage live migration, live migration, and live VDI migration, see Migrate
VMs.
Note:
If you are upgrading from an older version of XenServer or Citrix Hypervisor, you might need to
shut down and boot all VMs after migrating your VMs, to ensure that new virtualization features
are picked up.
By default, the VM is suspended, migrated, and resumed on the other host. The live parameter
selects live migration. Live migration keeps the VM running while performing the migration, thus min‑
imizing VM downtime. In some circumstances, such as extremely memory‑heavy workloads in the VM,
live migration falls back into default mode and suspends the VM for a short time before completing
the memory transfer.
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-pause
1 xe vm-pause
Pause a running VM. Note this operation does not free the associated memory (see vm-suspend).
vm-reboot
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
Use the force argument to cause an ungraceful reboot. Where the shutdown is akin to pulling the
plug on a physical server.
vm-recover
vm-reset-powerstate
1 xe vm-reset-powerstate [vm-selector=vm_selector_value...] {
2 force=true }
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
This is an advanced command only to be used when a member host in a pool goes down. You can
use this command to force the pool coordinator to reset the power‑state of the VMs to be halted.
Essentially, this command forces the lock on the VM and its disks so it can be started next on another
pool host. This call requires the force flag to be specified, and fails if it is not on the command‑line.
vm-restart-device-models
1 xe vm-restart-device-models [vm-selector=vm_selector_value...]
Restart the device model for this VM on the host. While the device model is restarting, you can’t stop,
start, or migrate the VM. The end user of the VM might see a slight pause and resume in their session.
Note:
For the restart device model action to be supported on a Windows VM, the VM must have the
XenServer VM Tools for Windows installed.
vm-resume
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
If the VM is on a shared SR in a pool of hosts, use the on argument to specify which pool member to
start it on. By default the system determines an appropriate host, which might be any of the members
of the pool.
vm-retrieve-wlb-recommendations
1 xe vm-retrieve-wlb-recommendations
vm-shutdown
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
Use the force argument to cause an ungraceful shutdown, similar to pulling the plug on a physical
server.
vm-snapshot
Snapshot an existing VM, using storage‑level fast disk snapshot operation where available.
vm-start
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
If the VMs are on a shared SR in a pool of hosts, use the on argument to specify which pool member
to start the VMs on. By default the system determines an appropriate host, which might be any of the
members of the pool.
vm-suspend
1 xe vm-suspend [vm-selector=vm_selector_value...]
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-uninstall
Uninstall a VM, destroying its disks (those VDIs that are marked RW and connected to this VM only) in
addition to its metadata record. To destroy just the VM metadata, use xe vm-destroy.
The VM or VMs on which this operation is performed are selected using the standard selection mech‑
anism. For more information, see VM selectors. Optional arguments can be any number of the VM
parameters listed at the beginning of this section.
vm-unpause
1 xe vm-unpause
vm-vcpu-hotplug
Dynamically adjust the number of vCPUs available to a running Linux VM. The number of vCPUs is
bounded by the parameter VCPUs-max. Windows VMs always run with the number of vCPUs set to
VCPUs-max and must be rebooted to change this value.
Use the new-vcpus parameter to define the new total number of vCPUs that you want to have after
running this command. Do not use this parameter to pass the number of vCPUs you want to add. For
example, if you have two existing vCPUs in your VM and want to add two more vCPUs, specify new-
vcpus=4.
The Linux VM or Windows VMs on which this operation is performed are selected using the standard se‑
lection mechanism. For more information, see VM selectors. Optional arguments can be any number
of the VM parameters listed at the beginning of this section.
Note:
When running Linux VMs without XenServer VM Tools installed, run the following command
on the VM as root to ensure the newly hot plugged vCPUs are used: # for i in /sys
/devices/system/cpu/cpu[1-9]*/online; do if [ "$(cat $i)"= 0 ];
then echo 1 > $i; fi; done
vm-vif-list
1 xe vm-vif-list [vm-selector=vm_selector_value...]
The VM or VMs on which this operation is performed are selected using the standard selection mecha‑
nism. For more information, see VM selectors. The selectors operate on the VM records when filtering,
and not on the VIF values. Optional arguments can be any number of the VM parameters listed at the
beginning of this section.
Scheduled snapshots
The vmss objects can be listed with the standard object listing command (xe vmss-list), and the
parameters manipulated with the standard parameter commands. For more information, see Low‑
level parameter commands
vmss-create
For example:
vmss-destroy
1 xe vmss-destroy uuid=uuid
USB pass‑through
USB pass‑through is supported for the following USB versions: 1.1, 2.0, and 3.0.
pusb-scan
1 xe pusb-scan host-uuid=host_uuid
vusb-create
Creates a virtual USB in the pool. Start the VM to pass through the USB to the VM.
vusb-unplug
1 xe vusb-unplug uuid=vusb_uuid
vusb-destroy
1 xe vusb-destroy uuid=vusb_uuid
Troubleshooting
If you experience technical difficulties with the XenServer host, this section is meant to help you solve
the problem if possible. If it isn’t possible, use the information in this section to gather the application
logs and other data that can help Technical Support track and resolve the issue.
The following articles provide troubleshooting information about specific areas of the product:
• VM troubleshooting
• Networking troubleshooting
• Clustered pool troubleshooting
• XenCenter troubleshooting
• Workload Balancing troubleshooting
• Conversion Manager troubleshooting
If you have trouble connecting to the XenServer host with XenCenter, check the following:
• Is your XenCenter an older version than the XenServer host that you are attempting to connect
to?
XenCenter 8.2.7 and earlier are not supported with XenServer 8 hosts. To manage your
XenServer 8 hosts or pools, you require the latest version of XenCenter with a version of the
form YYYY.x.x.
You can see the expiration date for your license access code in the XenServer host General tab
under the License Details section in XenCenter.
• The XenServer host talks to XenCenter using HTTPS over the following ports:
– Port 443 (a two‑way connection for commands and responses using the management API)
– Port 5900 for graphical VNC connections with paravirtualized Linux VMs.
If you have a firewall enabled between the XenServer host and the machine running the client
software, ensure that it allows traffic from these ports. For more information, see Internet con‑
nectivity.
Gather logs
Important:
XenServer server status reports can contain sensitive information. For more information, see
Data governance.
Click Server Status Report in the Tools menu to open the Server Status Report task. You can select
from a list of different types of information (various logs, crash dumps, and so on). The information is
compiled and downloaded to the machine that XenCenter is running on. For more information, see
the XenCenter documentation.
By default, the files gathered for a server status report can be limited in size. If you need log files that
are larger than the default, you can run the command xenserver-status-report -u in the
XenServer host console.
Rather than have logs written to the control domain filesystem, you can configure your XenServer host
to write them to a remote server. The remote server must have the syslogd daemon running on it to
receive the logs and aggregate them correctly. The syslogd daemon is a standard part of all flavors
of Linux and Unix, and third‑party versions are available for Windows and other operating systems.
Set the syslog_destination parameter to the host name or IP address of the remote server where you
want the logs to be written:
1 xe host-syslog-reconfigure host-uuid=host_uuid
To enforce the change. (You can also run this command remotely by specifying the host parame‑
ter.)
XenCenter logs
XenCenter also has a client‑side log. This file includes a complete description of all operations and
errors that occur when using XenCenter. It also contains informational logging of events that pro‑
vide you with an audit trail of various actions that have occurred. The XenCenter log file is stored
in your profile folder at the following path: %userprofile%\AppData\Roaming\XenServer
\XenCenter\logs\XenCenter.log.
To locate the XenCenter log files ‑ for example, when you want to open or email the log file ‑ click View
XenCenter Log Files in the XenCenter Help menu.
Installation logs
If you experience an unknown error during installation, capture the log file from your host and provide
it to Technical Support.
Using a keyboard connected directly to the host machine (not connected over a serial port), you can
access three virtual terminals during installation:
1 /opt/xensource/installer/report.py
3. You are prompted to choose where you want to save the log file: NFS, FTP, or Local media.
Select NFS or FTP to copy the log file to another machine on your network. To do so, networking
must be working properly, and you must have write access to a remote machine.
Select Local media to save the file to a removable storage device, such as a USB flash drive, on
the local machine.
Once you have made your selections, the program writes the log file to your chosen location.
The file name is support.tar.bz2.
Support
We provide Technical Support services to customers with a XenServer Premium Edition or Standard
Edition license. To access this support, you can open a Support Case online or contact the support
center by phone if you experience technical difficulties. For more information, see the XenServer sup‑
port page.
If you are using XenServer Trial Edition (unlicensed), you cannot access this support, but we do value
your feedback. For more information, see Provide feedback for XenServer and XenCenter.
Note:
If you installed XenServer 8 during its preview period, you must apply updates published on
March 18, 2024 or later to get your pool to a production‑supported level that is eligible to receive
technical support.
Frequent updates
XenServer 8 uses a frequent update model that delivers features, fixes, and improvements to your
hosts. We expect you to consume these updates within six months to remain in support. If the update
level of your pool is older than six months, we will ask you to reproduce the issue on the latest update
level.
Support checklist
This section guides you through possible actions to take when you experience an issue in your
XenServer environment. By completing as many of these steps as you can, you help us troubleshoot
your issue faster.
First steps
1. Before carrying out any recovery steps, capture any logs that you can from the environment:
• If the issue relates to XenServer, capture a server status report (SSR) of the host or pool
where the issue was seen. Go to the XenCenter Tools menu then Server Status Report.
• If the issue relates to XenCenter:
– Get the application log files by going to the XenCenter Help menu then View XenCen‑
ter Log Files.
– Capture screenshots of the relevant displays.
• If the issue relates to a VM, gather any relevant logs from the VM operating system.
For more information about getting log information, see Gather logs.
2. Make a note of the synchronization date, synchronization checksum, and update checksum for
your host or pool. For more information, see View pending tasks.
Self‑help
We provide information and guidance that can help you diagnose and resolve issues you might expe‑
rience.
• Known Issues: This article lists known issues in XenServer and, if applicable, any
workarounds you can apply.
• Early Access and Normal: These articles list available updates to XenServer. A fix for your
issue might have recently been released.
• Troubleshooting: This article is an entrypoint into the troubleshooting information pro‑
vided in the documentation.
• Review the section of the documentation related to the feature that is showing the issue.
There might be constraints to this feature that are causing the issue or configuration op‑
tions that can help fix it.
2. The Citrix Knowledge Center contains many articles written by our Technical Support team that
describe solutions to previously seen issues with XenServer.
If you take any diagnostic action or change your environment configuration as a result of this informa‑
tion, make a note of it and let us know if you do contact support.
If you are already using the latest version of all your XenServer components, skip to Capture logs.
If you are not running the latest XenServer, XenCenter, or related component, the fix for your issue
might be included in the latest version or update level. We recommend that you update your environ‑
ment to the latest version, if possible.
If you updated any of the components in your environment since you encountered the issue, attempt
to reproduce the issue now.
Capture logs
• If the issue relates to XenServer, capture a server status report (SSR) of the host or pool where
the issue was encountered. Go to the XenCenter Tools menu then Server Status Report.
• If the issue relates to XenCenter:
– Get the application log files by going to the XenCenter Help menu then View XenCenter
Log Files.
– Capture screenshots of the relevant displays.
• If the issue relates to a VM, gather any relevant logs from the VM operating system.
Contact support
For methods of getting in touch with us, see the XenServer support page.
Note:
If you are unable to reproduce the issue on an up‑to‑date pool, attach the SSR that you
captured when the issue first happened and explain why you were unable to apply all up‑
dates.
Help us to improve our product by providing feedback on the features and usability of our new release.
To provide feedback, do not contact Technical Support but instead submit a feedback email. Trial
Edition users can report a bug through the bugs portal.
Email any feedback and queries to [email protected]. To help us understand the full context
of your situation, ensure that you include the following information in your feedback email:
Note:
If you are a Premium Edition or Standard Edition customer, don’t use the bugs portal to request
assistance. Your issue is addressed faster by getting in touch with Technical Support. For more
information, see the XenServer support page.
• Create an account on the XenServer 8 Bugs portal. When creating your account, ensure that you
use a valid contactable email. Although we aim to respond to you on the ticket, sometimes it
might be necessary for us to contact you directly by email.
• Log a bug on the XenServer 8 Bugs portal by clicking Report an issue on XenServer.
Issues raised through the XenServer 8 Bugs portal are triaged and you might be contacted if the issue
merits investigation.
This release of XenServer includes third‑party software licensed under a number of different
licenses.
To extract the licensing information from your installed XenServer product and components, see the
instructions in XenServer Open Source Licensing and Attribution.
• This product includes software developed by the OpenSSL Project for use in the OpenSSL
Toolkit. (http://www.openssl.org/)
• This product includes cryptographic software written by Eric Young ([email protected]).
• XenServer High Availability is powered by everRun, a registered trademark of Stratus Technolo‑
gies Bermuda, Limited.
April 8, 2024
The XenServer product is a compilation of software packages. Each package is governed by its own
license. The complete licensing terms applicable to a given package can be found in the source RPM
of the package, unless the package is covered by a proprietary license which does not permit source
redistribution, in which case no source RPM is made available.
The XenServer distribution contains content from CentOS Linux and CentOS Stream. Where the Cen‑
tOS Project holds any copyright in the packages making up the CentOS Linux or CentOS Stream dis‑
tributions, that copyright is licensed under the GPLv2 license unless otherwise noted. For more infor‑
mation, see https://www.centos.org/legal/licensing‑policy/.
This article provides a method to extract the licensing information from all RPM packages included in
your XenServer installation.
This command lists all installed components and the licenses they are distributed under. The
output is of the following form:
1 readline-6.2: GPLv3+
2 gnupg2-2.0.22: GPLv3+
3 libdb-5.3.21: BSD and LGPLv2 and Sleepycat
4 rpm-python-4.11.3: GPLv2+
5 sqlite-3.7.17: Public Domain
6 qrencode-libs-3.4.1: LGPLv2+
7 libselinux-2.5: Public Domain
8 ustr-1.0.4: MIT or LGPLv2+ or BSD
9 gdbm-1.10: GPLv3+
10 procps-ng-3.3.10: GPL+ and GPLv2 and GPLv2+ and GPLv3+ and LGPLv2+
11 p11-kit-trust-0.23.5: BSD
12 device-mapper-libs-1.02.149: LGPLv2
13 xenserver-release-8.2.50: GPLv2
14 elfutils-libs-0.170: GPLv2+ or LGPLv3+
15 xz-libs-5.2.2: LGPLv2+
16 dbus-1.10.24: (GPLv2+ or AFL) and GPLv2+
17 elfutils-libelf-0.170: GPLv2+ or LGPLv3+
18 systemd-sysv-219: LGPLv2+
19 jemalloc-3.6.0: BSD
1 Name: host-upgrade-plugin
2 Version : 2.2.6
3 Release : 1.xs8
4 Architecture: noarch
Multiple licenses Some components in the XenServer product contain multiple licenses. For exam‑
ple, procps-ng-3.3.10contains the following parts:
• some parts which are licensed with the original GPL (or any later version)
• some parts which are licensed with the GPL version 2 (only)
• some parts which are licensed with the GPL version 2 (or any later version)
• some parts which are licensed with the GPL version 3 (or any later version)
• some parts which are licensed with the LGPL version 2 (or any later version)
In most cases, further information about each component and full license text is installed in either
/usr/share/doc/ or /usr/share/licenses.
For example, you can find more information about the component jemalloc-3.6.0 by running
the following command:
1 ls -l /usr/share/doc/jemalloc-3.6.0/
2
3 total 120
4 -rw-r--r--. 1 root root 1703 Mar 31 2014 COPYING
5 -rw-r--r--. 1 root root 109739 Mar 31 2014 jemalloc.html
6 -rw-r--r--. 1 root root 1084 Mar 31 2014 README
7 -rw-r--r--. 1 root root 50 Mar 31 2014 VERSION
However, for some components distributed by CentOS, the license text is not installed in the XenServer
product. To view the license text for these components, you can look inside the source RPMs.
We make the source RPMs for the XenServer host available in the following locations:
• For the base ISOs that are periodically released, source files are provided on the XenServer
download page.
• For updates, the source files are uploaded to a CDN alongside the product RPMs. To download
the source files, complete the following steps:
2. Get the UUIDs of the repositories in use by the pool, by running the following command:
3. Check if a proxy is configured and get its URL, by running the following command:
You cannot use these steps to download the source files through a proxy that has a user
name and password configured.
4. If a proxy is configured, in yum configure the proxy for the repositories, by running the
following command for each repository:
The name of the source file for a specific component is given by the value of “Source RPM”in the de‑
tailed information output. For example:
Supplemental Packs
Supplemental packs are installed into the XenServer host. If you have supplemental packs installed
in your host, their RPM information is included when you complete the steps in the previous section
of this article.
The source files for supplemental packs are also provided on the XenServer download page.
XenCenter
To view information about third‑party components included in XenCenter, complete the following
steps:
• The Windows I/O drivers, which are covered by the BSD2 license. Copyright Cloud Software
Group, Inc.
Licensing information is included in the INF file for each driver. When the drivers are installed
on your Windows system by Windows Update or the management agent installer, the INF files
are stored as C:\Windows\INF\OEM*.inf. The management agent installer also places
the INF files in C:\Program Files\XenServer\XenTools\Drivers\***.inf.
The XenServer VM Tools for Linux are covered by the BSD2 license. Copyright Cloud Software Group,
Inc.
The archive file provided on the product download page contains the license file and source files for
the tools.
Virtual Appliances
The following virtual appliances are provided as optional components for your XenServer environ‑
ment:
These virtual appliances are also CentOS based. You can use the same commands as those given
for the XenServer host to get overview and detailed information about the open source packages in‑
cluded in the virtual appliances.
In the console of the virtual appliance, run the following commands:
• For overview information: rpm -qa --qf '%{ name } -%{ version } : %{
license } \n'
• For detailed information: rpm -qai | sed '/^Name /i\\n'
In addition, the XenServer Conversion Manager virtual appliance and Workload Balancing virtual ap‑
pliance dynamically use some third‑party components.
• For XenServer Conversion Manager virtual appliance, the license files for these components are
located at the following path: /opt/vpxxcm/conversion.
• For Workload Balancing virtual appliance, the license files for these components are located at
the following path: /opt/vpx/wlb.
Source files for the virtual appliances are provided on the XenServer download page.
XenServer provides an SDK that enables you to develop or script clients that work with XenServer in
the following languages: PowerShell, Python, C#, C, Go, and Java.
If you already know what you are doing and want to look up a class or method, see our API reference
for XenServer 8 or Citrix Hypervisor 8.2 Cumulative Update 1.
To develop a driver disk or supplemental pack, see Supplemental Pack and DDK Guide.
Data Governance
This article provides information regarding the collection, storage, and retention of logs by
XenServer.
XenServer is a server virtualization platform that enables the customer to create and manage a deploy‑
ment of virtual machines. XenCenter is the management UI for XenServer. XenServer and XenCenter
can collect and store customer data as part of providing the following capabilities:
• Server status reports ‑ A server status report can be generated on‑demand and uploaded to
Citrix Insight Services or provided to Support. The server status report contains information
that can aid in diagnosing issues in the your environment.
• Automatic updates for the Management Agent ‑ The Management Agent runs within VMs
hosted on a XenServer host or pool. If the server or pool is licensed, the Management Agent
can check for and apply updates to itself and to the I/O drivers in the VM. As part of checking for
updates, the automatic update feature makes a web request to Cloud Software Group that can
identify the VM where the Management Agent runs.
• XenCenter check for updates ‑ This feature determines whether any hotfixes, cumulative up‑
dates, or new releases are available for the XenServer hosts and pools XenCenter manages. As
part of checking for updates, this feature makes a web request to Citrix that includes teleme‑
try. This telemetry is not user‑specific and is used to estimate the total number of XenCenter
instances worldwide.
• XenCenter email alerts XenCenter can be configured to send email notifications when alert
thresholds are exceeded. To send these email alerts, XenCenter collects and stores the target
email address.
Telemetry information received by Cloud Software Group is treated in accordance with our Agree‑
ments.
Telemetry
The XenServer telemetry functionality collects basic licensing information about your XenServer
pools.
When you install XenServer, your pool coordinator gathers telemetry data and uploads it weekly to
a Microsoft Azure Cloud environment located in the United States. This data does not identify indi‑
viduals or customers and is sent securely over HTTPS on port 443 to https://telemetry.ops
.xenserver.com/. No information other than the four elements identified below is collected or
transmitted.
Access to this data is restricted to members of the XenServer Operations and Product Management
teams.
Telemetry information received by Cloud Software Group is treated in accordance with our Agree‑
ments.
Telemetry collected
For each XenServer pool, the pool coordinator collects the following data:
This data does not identify individuals or customers and contains no personally identifiable informa‑
tion.
The data that XenServer submits is logged on your pool coordinator in /var/telemetry/
telemetry.data. This file is not collected in the server status logs.
During the course of operation a XenServer host collects and logs various information on the server
where XenServer is installed. These logs can be collected as part of a server status report.
A server status report can be generated on‑demand. You can upload these reports to Citrix Insight
Services or provide them to Support. The server status report contains information that can aid in
diagnosing issues in your environment.
Server status reports that are uploaded to Citrix Insight Services are stored in Amazon S3 environ‑
ments located in the United States.
XenServer and XenCenter collect information from the following data sources:
• XenCenter
• XenServer hosts and pools
• Hosted VMs
You can select which data items are included in the server status reports. You can also delete any
server status reports that are uploaded to your MyCitrix account on Citrix Insight Services.
Citrix Insight Services does not implement an automatic data retention for server status reports up‑
loaded by the customer. The customer determines the data retention policy. You can choose to delete
any server status reports that are uploaded to your MyCitrix account on Citrix Insight Services.
Data collected
device-model yes
fcoe yes
firstboot yes
network-status yes
process-list yes
xapi yes
xenserver-databases yes
control-slice maybe
disk-info maybe
hardware-info maybe
high-availability maybe
host-crashdump-logs maybe
kernel-info maybe
loopback-devices maybe
message-switch maybe
multipath maybe
system-logs maybe
v6d maybe
xapi-clusterd maybe
xapi-debug maybe
xcp-rrdd-plugins maybe
xen-info maybe
xenopsd maybe
xenserver-config maybe
xenserver-install maybe
xenserver-logs maybe
xha-liveset maybe
yum if customized
network-config if customized
cron if customized
blobs no
block-scheduler no
boot-loader no
conntest no
CVSM no
pam no
system-services no
tapdisk-logs no
VM-snapshot-schedule no
xapi-subprocess no
xen-bugtool no
xenserver-domains no
The Management Agent runs within VMs hosted on a XenServer host or pool. If the host or pool is
licensed, the Management Agent can check for and apply updates to itself and to the I/O drivers in the
VM. As part of checking for updates, the automatic update feature makes a web request to us that can
identify the VM where the Management Agent runs.
The web logs captured from the requests made by the Management Agent automatic updates feature
are located in a Microsoft Azure Cloud environment located in the United States. These logs are then
copied to a log management server in the United Kingdom.
The web requests made by the Management Agent automatic updates feature are made over HTTPS.
Web log files are transmitted securely to the log management server.
You can select whether your VM uses the Management Agent automatic update feature. If you choose
to use the Management Agent automatic update feature, you can also choose whether the web re‑
quest includes the VM identifying information.
Web logs containing information from web requests made by the Management Agent automatic up‑
dates feature and the XenCenter check for updates feature can be retained indefinitely.
Data collected
The Management Agent automatic updates web requests can contain the following data points:
This feature determines whether any hotfixes, cumulative updates, or new releases are available for
the XenServer hosts and pools XenCenter manages. As part of checking for updates, this feature
makes a web request to Cloud Software Group that includes telemetry. This telemetry does not per‑
sonally identify users and is used to estimate the total number of XenCenter instances worldwide.
The web logs captured from the requests made by the XenCenter check for updates feature are located
in a Microsoft Azure Cloud environment located in the United States. These logs are then copied to a
log management server in the United Kingdom.
The web requests made by the XenCenter check for updates feature are made over HTTPS. Web log
files are transmitted securely to the log management server.
The XenCenter check for updates feature is enabled by default. You can choose to disable this fea‑
ture.
Data collected
The check for updates feature web requests contain the following data points:
XenCenter can be configured to send email notifications when alert thresholds are exceeded. To send
these email alerts, XenCenter collects and stores the target email address.
The email address that XenCenter uses to send email alerts is stored on the machine where you in‑
stalled XenCenter.
You can delete email alerts configured in XenCenter to remove the stored email information.
XenCenter retains the email information used to provide email alerts for the lifetime of the email no‑
tification. When you delete the configured email alert, the data is removed.
Data collected
Email address The email address for alerts To send alert and notification
emails to
SMTP server The SMTP server to use To route the email alerts to the
recipient
XenServer 8
© 2024 Cloud Software Group, Inc. All rights reserved. Cloud Software Group, the Cloud Software Group logo, and other
marks appearing herein are property of Cloud Software Group, Inc. and/or one or more of its subsidiaries, and may be
registered with the U.S. Patent and Trademark Office and in other countries. All other marks are the property of their
respective owner(s).