Yes, I have tested and am able to run Windows Server 2016 and Server 2019 in secure mode with cloudstack as part of https://github.com/apache/cloudstack/pull/3638 pull request with cloudstack.
With the recent version I haven't checked. Thanks & Regards, Pavan Aravapalli. Architect. https://www.linkedin.com/in/pavan-a-70995a27/ On Tue, 24 Jan 2023 at 16:18, Gary Dixon <gary.di...@quadris.co.uk.invalid> wrote: > Thanks Pavan > > Are you successfully running Windows Server VM's in uefi secure boot mode > in Cloudstack ? > > Gary Dixon > Senior Technical Consultant > T: +44 161 537 4990 > E: *v* <+44%207989717661>ms@quadris‑support.com > W: www.quadris.co.uk > The information contained in this e-mail from Quadris may be confidential > and privileged for the private use of the named recipient. The contents of > this e-mail may not necessarily represent the official views of Quadris. > If you have received this information in error you must not copy, > distribute or take any action or reliance on its contents. Please destroy > any hard copies and delete this message. > -----Original Message----- > From: pavan aravapalli <aravapalli.by...@gmail.com> > Sent: 24 January 2023 07:47 > To: users@cloudstack.apache.org > Subject: Re: KVM host UEFI allow guest UEFI Secure boot > > Hi Gary, > > If you don't have any specific dependencies with Ubunut version try with > the latest Ubuntu 22.04, it has secure files. I verified and it supports > secure files. > > Thanks & Regards, > Pavan Aravapalli. > Architect. > > https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fpavan-a-70995a27%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cf26e2c788cae4190af3008dafddf2f3a%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C638101432282521311%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=lorVxhzKY8skt0LMTiDaby63B%2BA7EpSJv02hHNvzZls%3D&reserved=0 > > > > On Mon, 23 Jan 2023 at 23:08, Gary Dixon <gary.di...@quadris.co.uk.invalid > > > wrote: > > > Thanks Pavan > > > > Unfortunately, in the Ubuntu OVMF package it does not install a > > "OVMF_VARS.secboot.fd" file in the /usr/share/OVMF/ path This VARS > > file does not exist it appears on an ubuntu system. > > > > BR > > > > Gary > > > > Gary Dixon > > Senior Technical Consultant > > T: +44 161 537 4990 > > E: *v* <+44%207989717661>ms@quadris‑support.com > > W: > > https://eur01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.q > > uadris.co.uk%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cf26e2c788c > > ae4190af3008dafddf2f3a%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C63 > > 8101432282521311%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV > > 2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=9sQKrpy2Xs > > 1yrXYliGQSfPtARsaafISJIJ17JTFhB4s%3D&reserved=0 > > The information contained in this e-mail from Quadris may be > > confidential and privileged for the private use of the named > > recipient. The contents of this e-mail may not necessarily represent the > official views of Quadris. > > If you have received this information in error you must not copy, > > distribute or take any action or reliance on its contents. Please > > destroy any hard copies and delete this message. > > -----Original Message----- > > From: pavan aravapalli <aravapalli.by...@gmail.com> > > Sent: 23 January 2023 11:48 > > To: gary.di...@quadris.co.uk.invalid > > Cc: users@cloudstack.apache.org > > Subject: Re: KVM host UEFI allow guest UEFI Secure boot > > > > I see wrong vars configured for secure VAR. *<nvram > > template='/usr/share/OVMF/OVMF_VARS.fd'> * > > > > It should be something like > > "/usr/share/OVMF/OVMF_CODE.secboot.fd:/usr/share/OVMF/OVMF_VARS.fd", > > or the file should be like path to the OVMF_VARS.secboot.fd inside > > uefi.properties on the Ubuntu Host. I hope this helps. > > > > > > Thanks & Regards, > > Pavan Aravapalli. > > Architect. > > > > https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww. > > linkedin.com%2Fin%2Fpavan-a-70995a27%2F&data=05%7C01%7CGary.Dixon%40qu > > adris.co.uk%7Cf26e2c788cae4190af3008dafddf2f3a%7Cf1d6abf3d3b44894ae16d > > b0fb93a96a2%7C0%7C0%7C638101432282521311%7CUnknown%7CTWFpbGZsb3d8eyJWI > > joiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7 > > C%7C%7C&sdata=lorVxhzKY8skt0LMTiDaby63B%2BA7EpSJv02hHNvzZls%3D&reserve > > d=0 > > > > > > > > > > On Fri, 20 Jan 2023 at 16:01, Gary Dixon > > <gary.di...@quadris.co.uk.invalid > > > > > wrote: > > > > > I think this is possibly a bug in CS 4.15.2 with KVM hypervisor on > > > Ubuntu > > > 20.04 > > > > > > > > > > > > I have evicted one of our hosts from the cloudstack cluster and > > > added the /etc/cloudstack/agent/uefi.properties file. > > > > > > > > > > > > Cleared out the keystore and set the libvirtd.conf file back to > > > listen_tls=0, listen_tcp=1 and re-added the host back in to the > > > cluster in Cloudstack > > > > > > > > > > > > In the agent logs I can see that it detects the uefi.properties file > > > and enumerates the paths. > > > > > > > > > > > > The host is added back into Cloudstack – but in the database in the > > > “host_details” table I see the “host.uefi.enable” value is set to > “false” > > > for this host ? > > > > > > > > > > > > We then manually set “host.uefi.enable” to true in the database > > > > > > > > > > > > I then provision a new instance and use a Windows Server2016 ISO to > > > provision the machine on this uefi enabled host. I set the adv > > > settings to > > > BIOS: UEFI BOOT MODE: Secure > > > > > > The VM starts but when I console on to it there is an error message > > > on the console window saying “*Guest has not initialized the display > > > (yet)”* > > > > > > So at this point it appears we are unable to create any VM’s with > > > uefi – secure boot enabled > > > > > > > > > > > > Has anyone suucessfully managed to get Windows VM’s with uefi secure > > > boot enabled working in Cloudstack 4.15.2 with KVM hypervisor on > > > Ubuntu 20.04 hosts ? > > > > > > > > > > > > > > > > > > A virsh dumpxml shows this: > > > > > > > > > > > > <description>Windows Server 2016 (64-bit)</description> > > > > > > <memory unit='KiB'>8388608</memory> > > > > > > <currentMemory unit='KiB'>8388608</currentMemory> > > > > > > <vcpu placement='static'>4</vcpu> > > > > > > <cputune> > > > > > > <shares>3240</shares> > > > > > > </cputune> > > > > > > <resource> > > > > > > <partition>/machine</partition> > > > > > > </resource> > > > > > > <sysinfo type='smbios'> > > > > > > <system> > > > > > > <entry name='manufacturer'>Apache Software Foundation</entry> > > > > > > <entry name='product'>CloudStack KVM Hypervisor</entry> > > > > > > <entry name='uuid'>39c9fa33-0ef2-463a-aff6-45b6e77d1c4d</entry> > > > > > > </system> > > > > > > </sysinfo> > > > > > > <os> > > > > > > <type arch='x86_64' machine='pc-q35-4.2'>hvm</type> > > > > > > <loader readonly='yes' secure='yes' > > > type='pflash'>/usr/share/OVMF/OVMF_CODE.secboot.fd</loader> > > > > > > <nvram > > > template='/usr/share/OVMF/OVMF_VARS.fd'>/var/lib/libvirt/qemu/nvram/ > > > 39 c9fa33-0ef2-463a-aff6-45b6e77d1c4d.fd</nvram> > > > > > > <boot dev='cdrom'/> > > > > > > <boot dev='hd'/> > > > > > > <smbios mode='sysinfo'/> > > > > > > </os> > > > > > > <features> > > > > > > <acpi/> > > > > > > <apic/> > > > > > > <pae/> > > > > > > <smm state='on'/> > > > > > > </features> > > > > > > <cpu mode='host-passthrough' check='none'> > > > > > > <topology sockets='1' cores='4' threads='1'/> > > > > > > </cpu> > > > > > > <clock offset='localtime'> > > > > > > <timer name='hypervclock' present='yes'/> > > > > > > </clock> > > > > > > <on_poweroff>destroy</on_poweroff> > > > > > > <on_reboot>restart</on_reboot> > > > > > > <on_crash>destroy</on_crash> > > > > > > <devices> > > > > > > <emulator>/usr/bin/qemu-system-x86_64</emulator> > > > > > > <disk type='block' device='disk'> > > > > > > <driver name='qemu' type='raw' cache='none'/> > > > > > > <source dev='/dev/storpool-byid/n91t.b.brrdr' index='2'/> > > > > > > <backingStore/> > > > > > > <target dev='sda' bus='sata'/> > > > > > > <serial>69bcfffc3c8a41ab876b</serial> > > > > > > <alias name='sata0-0-0'/> > > > > > > <address type='drive' controller='0' bus='0' target='0' > > > unit='0'/> > > > > > > </disk> > > > > > > <disk type='file' device='cdrom'> > > > > > > <driver name='qemu' type='raw'/> > > > > > > <source > > > > > > file='/mnt/45d6d957-afa2-371a-b0dc-b6e70ef17d97/035fa65a-4556-47b0-95c1-ac2db8ee054e.iso' > > > index='1'/> > > > > > > <backingStore/> > > > > > > <target dev='sdd' bus='sata'/> > > > > > > <readonly/> > > > > > > <alias name='sata0-0-3'/> > > > > > > <address type='drive' controller='0' bus='0' target='0' > > > unit='3'/> > > > > > > </disk> > > > > > > <controller type='usb' index='0' model='qemu-xhci'> > > > > > > <alias name='usb'/> > > > > > > <address type='pci' domain='0x0000' bus='0x03' slot='0x00' > > > function='0x0'/> > > > > > > </controller> > > > > > > <controller type='sata' index='0'> > > > > > > <alias name='ide'/> > > > > > > <address type='pci' domain='0x0000' bus='0x00' slot='0x1f' > > > function='0x2'/> > > > > > > </controller> > > > > > > <controller type='pci' index='0' model='pcie-root'> > > > > > > <alias name='pcie.0'/> > > > > > > </controller> > > > > > > <controller type='virtio-serial' index='0'> > > > > > > <alias name='virtio-serial0'/> > > > > > > <address type='pci' domain='0x0000' bus='0x04' slot='0x00' > > > function='0x0'/> > > > > > > </controller> > > > > > > <controller type='pci' index='1' model='pcie-root-port'> > > > > > > <model name='pcie-root-port'/> > > > > > > <target chassis='1' port='0x10'/> > > > > > > <alias name='pci.1'/> > > > > > > <address type='pci' domain='0x0000' bus='0x00' slot='0x02' > > > function='0x0' multifunction='on'/> > > > > > > </controller> > > > > > > <controller type='pci' index='2' model='pcie-to-pci-bridge'> > > > > > > <model name='pcie-pci-bridge'/> > > > > > > <alias name='pci.2'/> > > > > > > <address type='pci' domain='0x0000' bus='0x01' slot='0x00' > > > function='0x0'/> > > > > > > </controller> > > > > > > <controller type='pci' index='3' model='pcie-root-port'> > > > > > > <model name='pcie-root-port'/> > > > > > > <target chassis='3' port='0x11'/> > > > > > > <alias name='pci.3'/> > > > > > > <address type='pci' domain='0x0000' bus='0x00' slot='0x02' > > > function='0x1'/> > > > > > > </controller> > > > > > > <controller type='pci' index='4' model='pcie-root-port'> > > > > > > <model name='pcie-root-port'/> > > > > > > <target chassis='4' port='0x12'/> > > > > > > <alias name='pci.4'/> > > > > > > <address type='pci' domain='0x0000' bus='0x00' slot='0x02' > > > function='0x2'/> > > > > > > </controller> > > > > > > <controller type='pci' index='5' model='pcie-root-port'> > > > > > > <model name='pcie-root-port'/> > > > > > > <target chassis='5' port='0x13'/> > > > > > > <alias name='pci.5'/> > > > > > > <address type='pci' domain='0x0000' bus='0x00' slot='0x02' > > > function='0x3'/> > > > > > > </controller> > > > > > > <interface type='bridge'> > > > > > > <mac address='02:00:0d:ea:00:0f'/> > > > > > > <source bridge='brvx-17906'/> > > > > > > <bandwidth> > > > > > > <inbound average='25600' peak='25600'/> > > > > > > <outbound average='25600' peak='25600'/> > > > > > > </bandwidth> > > > > > > <target dev='vnet0'/> > > > > > > <model type='e1000'/> > > > > > > <link state='up'/> > > > > > > <alias name='net0'/> > > > > > > <address type='pci' domain='0x0000' bus='0x02' slot='0x01' > > > function='0x0'/> > > > > > > </interface> > > > > > > <serial type='pty'> > > > > > > <source path='/dev/pts/2'/> > > > > > > <target type='isa-serial' port='0'> > > > > > > <model name='isa-serial'/> > > > > > > </target> > > > > > > <alias name='serial0'/> > > > > > > </serial> > > > > > > <console type='pty' tty='/dev/pts/2'> > > > > > > <source path='/dev/pts/2'/> > > > > > > <target type='serial' port='0'/> > > > > > > <alias name='serial0'/> > > > > > > </console> > > > > > > <channel type='unix'> > > > > > > <source mode='bind' > > > path='/var/lib/libvirt/qemu/i-2-1811-VM.org.qemu.guest_agent.0'/> > > > > > > <target type='virtio' name='org.qemu.guest_agent.0' > > > state='disconnected'/> > > > > > > <alias name='channel0'/> > > > > > > <address type='virtio-serial' controller='0' bus='0' port='1'/> > > > > > > </channel> > > > > > > <input type='tablet' bus='usb'> > > > > > > <alias name='input0'/> > > > > > > <address type='usb' bus='0' port='1'/> > > > > > > </input> > > > > > > <input type='mouse' bus='ps2'> > > > > > > <alias name='input1'/> > > > > > > </input> > > > > > > <input type='keyboard' bus='ps2'> > > > > > > <alias name='input2'/> > > > > > > </input> > > > > > > <graphics type='vnc' port='5900' autoport='yes' > > > listen='10.255.4.14'> > > > > > > <listen type='address' address='10.255.4.14'/> > > > > > > </graphics> > > > > > > <video> > > > > > > <model type='cirrus' vram='16384' heads='1' primary='yes'/> > > > > > > <alias name='video0'/> > > > > > > <address type='pci' domain='0x0000' bus='0x00' slot='0x01' > > > function='0x0'/> > > > > > > </video> > > > > > > <watchdog model='i6300esb' action='none'> > > > > > > <alias name='watchdog0'/> > > > > > > <address type='pci' domain='0x0000' bus='0x02' slot='0x02' > > > function='0x0'/> > > > > > > </watchdog> > > > > > > <memballoon model='none'/> > > > > > > </devices> > > > > > > <seclabel type='dynamic' model='dac' relabel='yes'> > > > > > > <label>+0:+0</label> > > > > > > <imagelabel>+0:+0</imagelabel> > > > > > > </seclabel> > > > > > > </domain> > > > > > > > > > > > > > > > > > > > > > > > > > > > Gary Dixon > > > Senior Technical Consultant > > > T: +44 161 537 4990 > > > E: *v* <+44%207989717661>ms@quadris‑support.com > > > W: > > > https://eur01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww > > > .q%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cf26e2c788cae4190af > > > 3008dafddf2f3a%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C63810143 > > > 2282521311%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM > > > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BRsJ%2B2rg > > > Sn4XcuwIANRcMI3xdLjr6K%2FDW7GwzzGpUjU%3D&reserved=0 > > > uadris.co.uk%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cd65b0c4a > > > a7 > > > ee4160b06c08dafd37c31d%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C > > > 63 > > > 8100713210482703%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo > > > iV > > > 2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=CvI%2BIr > > > 5b > > > FQFMJZOnJOwfko9874LnCsZKKzSRc6lHzPw%3D&reserved=0 > > > The information contained in this e-mail from Quadris may be > > > confidential and privileged for the private use of the named > > > recipient. The contents of this e-mail may not necessarily represent > > > the > > official views of Quadris. > > > If you have received this information in error you must not copy, > > > distribute or take any action or reliance on its contents. Please > > > destroy any hard copies and delete this message. > > > > > > *From:* Gary Dixon <gary.di...@quadris.co.uk.INVALID> > > > *Sent:* 19 January 2023 14:35 > > > *To:* users@cloudstack.apache.org > > > *Subject:* RE: KVM host UEFI allow guest UEFI Secure boot > > > > > > > > > > > > I think I just solved this myself – in the qemu.conf file I see : > > > > > > > > > > > > #nvram = [ > > > > > > # "/usr/share/OVMF/OVMF_CODE.fd:/usr/share/OVMF/OVMF_VARS.fd", > > > > > > # > > > "/usr/share/OVMF/OVMF_CODE.secboot.fd:/usr/share/OVMF/OVMF_VARS.fd", > > > > > > # "/usr/share/AAVMF/AAVMF_CODE.fd:/usr/share/AAVMF/AAVMF_VARS.fd", > > > > > > # > > > "/usr/share/AAVMF/AAVMF32_CODE.fd:/usr/share/AAVMF/AAVMF32_VARS.fd", > > > > > > # "/usr/share/OVMF/OVMF_CODE.ms.fd:/usr/share/OVMF/OVMF_VARS.ms.fd" > > > > > > #] > > > > > > > > > > > > So in Ubuntu 20.04 there is no reference to OVMF_VARS.secure.fd for > > > the nvram template > > > > > > > > > > > > > > > > > > *Gary Dixon*** > > > > > > Senior Technical Consultant > > > > > > T: +44 161 537 4990 > > > > > > E: *v* <+44%207989717661>ms@quadris‑support.com > > > > > > W: > > > https://eur01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww > > > .q%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cf26e2c788cae4190af > > > 3008dafddf2f3a%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C63810143 > > > 2282521311%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM > > > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BRsJ%2B2rg > > > Sn4XcuwIANRcMI3xdLjr6K%2FDW7GwzzGpUjU%3D&reserved=0 > > > uadris.co.uk%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cd65b0c4a > > > a7 > > > ee4160b06c08dafd37c31d%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C > > > 63 > > > 8100713210482703%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo > > > iV > > > 2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=CvI%2BIr > > > 5b > > > FQFMJZOnJOwfko9874LnCsZKKzSRc6lHzPw%3D&reserved=0 > > > > > > *The information contained in this e-mail from Quadris may be > > > confidential and privileged for the private use of the named > > > recipient. The contents of this e-mail may not necessarily represent > > > the > > official views of Quadris. > > > If you have received this information in error you must not copy, > > > distribute or take any action or reliance on its contents. Please > > > destroy any hard copies and delete this message.* > > > > > > *From:* Gary Dixon <gary.di...@quadris.co.uk.INVALID> > > > *Sent:* 19 January 2023 13:55 > > > *To:* users@cloudstack.apache.org > > > *Subject:* RE: KVM host UEFI allow guest UEFI Secure boot > > > > > > > > > > > > Thanks for all your quick responses > > > > > > On our Ubuntu 20.04 hosts it appears that the OVMF files are located > > > in "/usr/share/OVMF/" directory - however the OVMF_VARS.secboot.fd > > > file is not there ? : > > > > > > root@qcloud-s2-p1-c1-kvm4:~# ls -al /usr/share/OVMF/ total 4232 > > > drwxr-xr-x 2 root root 4096 Mar 9 2022 . > > > drwxr-xr-x 151 root root 4096 Apr 2 2022 .. > > > -rw-r--r-- 1 root root 1966080 Sep 20 2021 OVMF_CODE.fd lrwxrwxrwx 1 > > > root root 20 Sep 20 2021 OVMF_CODE.ms.fd -> OVMF_CODE.secboot.fd > > > -rw-r--r-- 1 root root 1966080 Sep 20 2021 OVMF_CODE.secboot.fd > > > -rw-r--r-- 1 root root 131072 Sep 20 2021 OVMF_VARS.fd > > > -rw-r--r-- 1 root root 131072 Sep 20 2021 OVMF_VARS.ms.fd > > > -rw-r--r-- 1 root root 131072 Sep 20 2021 OVMF_VARS.snakeoil.fd > > > > > > Is this needed in the uefi.properties config file ? > > > > > > > > > BR > > > > > > Gary > > > > > > *Gary Dixon*** > > > > > > Senior Technical Consultant > > > > > > T: +44 161 537 4990 > > > > > > E: *v* <+44%207989717661>ms@quadris‑support.com > > > > > > W: > > > https://eur01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww > > > .q%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cf26e2c788cae4190af > > > 3008dafddf2f3a%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C63810143 > > > 2282521311%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM > > > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BRsJ%2B2rg > > > Sn4XcuwIANRcMI3xdLjr6K%2FDW7GwzzGpUjU%3D&reserved=0 > > > uadris.co.uk%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cd65b0c4a > > > a7 > > > ee4160b06c08dafd37c31d%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C > > > 63 > > > 8100713210482703%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo > > > iV > > > 2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=CvI%2BIr > > > 5b > > > FQFMJZOnJOwfko9874LnCsZKKzSRc6lHzPw%3D&reserved=0 > > > < > https://eur01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cf26e2c788cae4190af3008dafddf2f3a%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C638101432282521311%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=NiHb9GkcaVicr%2BYgT2iwVbkus2iOVt94B6Dnqltpc4M%3D&reserved=0 > . > > > quadris.co.uk%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cd65b0c4 > > > aa > > > 7ee4160b06c08dafd37c31d%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7 > > > C6 > > > 38100713210482703%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIj > > > oi > > > V2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=CvI%2BI > > > r5 bFQFMJZOnJOwfko9874LnCsZKKzSRc6lHzPw%3D&reserved=0> > > > > > > *The information contained in this e-mail from Quadris may be > > > confidential and privileged for the private use of the named > > > recipient. The contents of this e-mail may not necessarily represent > > > the > > official views of Quadris. > > > If you have received this information in error you must not copy, > > > distribute or take any action or reliance on its contents. Please > > > destroy any hard copies and delete this message.* > > > > > > -----Original Message----- > > > From: vas...@gmx.de <vas...@gmx.de> > > > Sent: 19 January 2023 13:42 > > > To: users@cloudstack.apache.org > > > Subject: Re: KVM host UEFI allow guest UEFI Secure boot > > > > > > Not the direct solution but maybe some bits of information for your > > > further > > > efforts: > > > > > > Overall description of the feature > > > > > > https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcw > > > ik%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cf26e2c788cae4190af > > > 3008dafddf2f3a%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C63810143 > > > 2282521311%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM > > > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=p6SsRbXhoRwg > > > qZA%2BHq%2BuB8eOAB1KDo%2FT6OX2wkVCxQA%3D&reserved=0 > > > i.apache.org%2Fconfluence%2Fdisplay%2FCLOUDSTACK%2FEnable%2BUEFI%2Bb > > > oo > > > ting%2Bfor%2BInstance&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cd6 > > > 5b > > > 0c4aa7ee4160b06c08dafd37c31d%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0% > > > 7C > > > 0%7C638100713210482703%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiL > > > CJ > > > QIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2 > > > B3 > > > xMHAdxbXmMo3zOR0BbkYTZanjtB2uuyC0DIdtByu4%3D&reserved=0 > > > <https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fc > > > wi%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cf26e2c788cae4190af > > > 3008dafddf2f3a%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C63810143 > > > 2282521311%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM > > > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=XRSqtKEeOaaK > > > toem9veFyBG69I8VxyTEstw%2FynIRPvU%3D&reserved=0 > > > ki.apache.org%2Fconfluence%2Fdisplay%2FCLOUDSTACK%2FEnable%2BUEFI%2B > > > bo > > > oting%2Bfor%2BInstance&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cd > > > 65 > > > b0c4aa7ee4160b06c08dafd37c31d%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0 > > > %7 > > > C0%7C638100713210482703%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAi > > > LC > > > JQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=% > > > 2B 3xMHAdxbXmMo3zOR0BbkYTZanjtB2uuyC0DIdtByu4%3D&reserved=0> > > > > > > User guide + example to enable secure boot > > > > > > > https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Flab%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cf26e2c788cae4190af3008dafddf2f3a%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C638101432282521311%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=gBUW6JAJ3g6ZyDSGmdNka2%2BqwKopgFGuOrmvn3YxkRI%3D&reserved=0 > . > > > piszki.pl%2Fcloudstack-vm-with-vtpm-and-secure-boot-uefi%2F&data=05% > > > 7C > > > 01%7CGary.Dixon%40quadris.co.uk%7Cd65b0c4aa7ee4160b06c08dafd37c31d%7 > > > Cf > > > 1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C638100713210482703%7CUnkno > > > wn > > > %7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiL > > > CJ > > > XVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=9dMCVhwcFEizLkLejx204wPAX7kBrpKlpK > > > P0 > > > vKUOjDA%3D&reserved=0 > > > <https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fl > > > ab%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cf26e2c788cae4190af > > > 3008dafddf2f3a%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C63810143 > > > 2282521311%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM > > > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=gBUW6JAJ3g6Z > > > yDSGmdNka2%2BqwKopgFGuOrmvn3YxkRI%3D&reserved=0 > > > .piszki.pl%2Fcloudstack-vm-with-vtpm-and-secure-boot-uefi%2F&data=05 > > > %7 > > > C01%7CGary.Dixon%40quadris.co.uk%7Cd65b0c4aa7ee4160b06c08dafd37c31d% > > > 7C > > > f1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C638100713210482703%7CUnkn > > > ow > > > n%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwi > > > LC > > > JXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=9dMCVhwcFEizLkLejx204wPAX7kBrpKlp > > > KP > > > 0vKUOjDA%3D&reserved=0> > > > > > > Gitlab - Issue with further informations on deploying that > > > capability > > > > > > https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgi > > > th%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cf26e2c788cae4190af > > > 3008dafddf2f3a%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C63810143 > > > 2282521311%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM > > > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=POKDA0xGQh31 > > > zymO2S96oeOCS3AnKhQJZpsIxozaiPA%3D&reserved=0 > > > ub.com%2Fapache%2Fcloudstack%2Fissues%2F4238&data=05%7C01%7CGary.Dix > > > on > > > %40quadris.co.uk%7Cd65b0c4aa7ee4160b06c08dafd37c31d%7Cf1d6abf3d3b448 > > > 94 > > > ae16db0fb93a96a2%7C0%7C0%7C638100713210482703%7CUnknown%7CTWFpbGZsb3 > > > d8 > > > eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7 > > > C3 > > > 000%7C%7C%7C&sdata=oztk%2F9Q0hPlLrgPvFUomx18kO9zlOBzyJXrz%2BKVByzc%3 > > > D& > > > reserved=0 > > > <https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fg > > > it%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cf26e2c788cae4190af > > > 3008dafddf2f3a%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C63810143 > > > 2282521311%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM > > > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=t9bM15PwC0RH > > > B6MYIPU%2BfnzGIdthXiyLnlsGfu3GL00%3D&reserved=0 > > > hub.com%2Fapache%2Fcloudstack%2Fissues%2F4238&data=05%7C01%7CGary.Di > > > xo > > > n%40quadris.co.uk%7Cd65b0c4aa7ee4160b06c08dafd37c31d%7Cf1d6abf3d3b44 > > > 89 > > > 4ae16db0fb93a96a2%7C0%7C0%7C638100713210482703%7CUnknown%7CTWFpbGZsb > > > 3d > > > 8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D% > > > 7C > > > 3000%7C%7C%7C&sdata=oztk%2F9Q0hPlLrgPvFUomx18kO9zlOBzyJXrz%2BKVByzc% > > > 3D > > > &reserved=0> > > > > > > regards, > > > Chris > > > > > > Am Do., 19. Jan. 2023 um 14:09 Uhr schrieb Gary Dixon > > > <gary.di...@quadris.co.uk.invalid>: > > > > > > > Hi everyone > > > > > > > > > > > > > > > > CS : 4.15.2 > > > > > > > > Hypervisor: KVM > > > > > > > > OS: Ubuntu 20.04 > > > > > > > > > > > > > > > > Apologies if this has been discussed before. > > > > > > > > We have a requirement to create Windows server templates with UEFI > > > > Secure boot enabled and in testing find that our instances are > > > > being created with Legacy BIOS enabled. > > > > > > > > I checked our KVM hosts and they have the ovmf package installed – > > > > however there is no uefi.properties file in the > > > > /etc/cloudstack/agent directory > > > > > > > > How do I enable the KVM hosts to support Cloudstack guests with > > > > UEFI Secure boot bios ? > > > > > > > > Also will this ‘break’ all current running VM’s that have the > > > > Legacy BIOS enabled or will they still be able to run ? > > > > > > > > > > > > > > > > BR > > > > > > > > > > > > > > > > Gary > > > > Gary Dixon > > > > Senior Technical Consultant > > > > T: +44 161 537 4990 > > > > E: *v* <+44%207989717661>ms@quadris‑support.com > > > <ms@quadris%1esupport.com> > > > > W: > > > > https://eur01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fw > > > > ww%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cf26e2c788cae4190 > > > > af3008dafddf2f3a%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C6381 > > > > 01432282521311%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo > > > > iV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=NiHb > > > > 9GkcaVicr%2BYgT2iwVbkus2iOVt94B6Dnqltpc4M%3D&reserved=0 > > > > .q%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cd65b0c4aa7ee4160 > > > > b0 > > > > 6c08dafd37c31d%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C638100 > > > > 71 > > > > 3210482703%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2l > > > > uM > > > > zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=n%2FW0gLeh > > > > %2 > > > > BX0kzNDYIJlvbJEWi9KFzKRx6Y%2FQ7oNGJ%2Fw%3D&reserved=0 > > > < > https://eur01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cf26e2c788cae4190af3008dafddf2f3a%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C638101432282521311%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=NiHb9GkcaVicr%2BYgT2iwVbkus2iOVt94B6Dnqltpc4M%3D&reserved=0 > . > > > q%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7Cd65b0c4aa7ee4160b06 > > > c0 > > > 8dafd37c31d%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0%7C63810071321 > > > 04 > > > 82703%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLC > > > JB > > > TiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=n%2FW0gLeh%2BX0kzND > > > YI JlvbJEWi9KFzKRx6Y%2FQ7oNGJ%2Fw%3D&reserved=0> > > > > uadris.co.uk%2F&data=05%7C01%7CGary.Dixon%40quadris.co.uk%7C8057c1 > > > > b2 > > > > e3 > > > > bd4f13beae08dafa231af3%7Cf1d6abf3d3b44894ae16db0fb93a96a2%7C0%7C0% > > > > 7C > > > > 63 > > > > 8097325927612509%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQI > > > > jo > > > > iV > > > > 2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=M9uXGY > > > > 9a > > > > AT > > > > 4z8oYezjiqrFQ6%2FH9nDV4ZmDOXn6RxUB4%3D&reserved=0 > > > > The information contained in this e-mail from Quadris may be > > > > confidential and privileged for the private use of the named > > > > recipient. The contents of this e-mail may not necessarily > > > > represent the > > > official views of Quadris. > > > > If you have received this information in error you must not copy, > > > > distribute or take any action or reliance on its contents. Please > > > > destroy any hard copies and delete this message. > > > > > > > > > >