<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.openvz.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kotakomputer</id>
	<title>OpenVZ Virtuozzo Containers Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.openvz.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kotakomputer"/>
	<link rel="alternate" type="text/html" href="https://wiki.openvz.org/Special:Contributions/Kotakomputer"/>
	<updated>2026-05-15T20:57:46Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.1</generator>
	<entry>
		<id>https://wiki.openvz.org/index.php?title=Migration_from_one_HN_to_another&amp;diff=12439</id>
		<title>Migration from one HN to another</title>
		<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=Migration_from_one_HN_to_another&amp;diff=12439"/>
		<updated>2012-05-27T08:11:24Z</updated>

		<summary type="html">&lt;p&gt;Kotakomputer: /* Summary */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{wikify}}&lt;br /&gt;
&lt;br /&gt;
The vzmigrate script is used to migrate a [[container]] from one [[Hardware Node]] to another.&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
&lt;br /&gt;
OLD SERVER:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[root@OpenVZ ~]# ssh-keygen -t rsa&lt;br /&gt;
[root@OpenVZ ~]# cd .ssh/&lt;br /&gt;
[root@OpenVZ .ssh]# scp id_rsa.pub root@10.1.5.6:./id_rsa.pub&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
NEW SERVER:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[root@Char ~]# cd .ssh/&lt;br /&gt;
[root@Char .ssh]# touch authorized_keys2&lt;br /&gt;
[root@Char .ssh]# chmod 600 authorized_keys2&lt;br /&gt;
[root@Char .ssh]# cat ../id_rsa.pub &amp;gt;&amp;gt; authorized_keys2&lt;br /&gt;
[root@Char .ssh]# rm ../id_rsa.pub&lt;br /&gt;
rm: remove regular file `../id_rsa.pub'? y&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
OLD SERVER: (test if we can ssh without password)&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[root@OpenVZ .ssh]# ssh -2 -v root@10.1.5.6&lt;br /&gt;
[root@Char ~]# exit&lt;br /&gt;
[root@OpenVZ .ssh]# vzmigrate 10.1.5.6 101&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Above example migrate VM 101 to 10.1.5.6. You can read detail explanation below:&lt;br /&gt;
&lt;br /&gt;
== Setting up SSH keys ==&lt;br /&gt;
&lt;br /&gt;
You first have to setup SSH to permit the old HN to be able to login to the new HN without a password prompt. Run the following on the old HN.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@OpenVZ ~]# ssh-keygen -t rsa&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/root/.ssh/id_rsa):&lt;br /&gt;
Created directory '/root/.ssh'.&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /root/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /root/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
74:7a:3e:7f:27:2f:42:bb:52:4c:ad:55:31:6f:79:f2 root@OpenVZ.ics.local&lt;br /&gt;
[root@OpenVZ ~]# cd .ssh/&lt;br /&gt;
[root@OpenVZ .ssh]# ls -al&lt;br /&gt;
total 20&lt;br /&gt;
drwx------  2 root root 4096 Aug 11 09:41 .&lt;br /&gt;
drwxr-x---  5 root root 4096 Aug 11 09:40 ..&lt;br /&gt;
-rw-------  1 root root  887 Aug 11 09:41 id_rsa&lt;br /&gt;
-rw-r--r--  1 root root  231 Aug 11 09:41 id_rsa.pub&lt;br /&gt;
[root@OpenVZ .ssh]# scp id_rsa.pub root@10.1.5.6:./id_rsa.pub&lt;br /&gt;
The authenticity of host '10.1.5.6 (10.1.5.6)' can't be established.&lt;br /&gt;
RSA key fingerprint is 3f:2a:26:15:e4:37:e2:06:b8:4d:20:ee:3a:dc:c1:69.&lt;br /&gt;
Are you sure you want to continue connecting (yes/no)? yes&lt;br /&gt;
Warning: Permanently added '10.1.5.6' (RSA) to the list of known hosts.&lt;br /&gt;
root@10.1.5.6's password:&lt;br /&gt;
id_rsa.pub               100%  231     0.2KB/s   00:00&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Run the following on the new HN.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@Char ~]# cd .ssh/&lt;br /&gt;
[root@Char .ssh]# touch authorized_keys2&lt;br /&gt;
[root@Char .ssh]# chmod 600 authorized_keys2&lt;br /&gt;
[root@Char .ssh]# cat ../id_rsa.pub &amp;gt;&amp;gt; authorized_keys2&lt;br /&gt;
[root@Char .ssh]# rm ../id_rsa.pub&lt;br /&gt;
rm: remove regular file `../id_rsa.pub'? y&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Run the following on the old HN.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@OpenVZ .ssh]# ssh -2 -v root@10.1.5.6&lt;br /&gt;
OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19 2003&lt;br /&gt;
debug1: Reading configuration data /etc/ssh/ssh_config&lt;br /&gt;
debug1: Applying options for *&lt;br /&gt;
debug1: Connecting to 10.1.5.6 [10.1.5.6] port 22.&lt;br /&gt;
debug1: Connection established.&lt;br /&gt;
debug1: permanently_set_uid: 0/0&lt;br /&gt;
debug1: identity file /root/.ssh/id_rsa type 1&lt;br /&gt;
debug1: identity file /root/.ssh/id_dsa type -1&lt;br /&gt;
debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3&lt;br /&gt;
debug1: match: OpenSSH_4.3 pat OpenSSH*&lt;br /&gt;
debug1: Enabling compatibility mode for protocol 2.0&lt;br /&gt;
debug1: Local version string SSH-2.0-OpenSSH_3.9p1&lt;br /&gt;
debug1: SSH2_MSG_KEXINIT sent&lt;br /&gt;
debug1: SSH2_MSG_KEXINIT received&lt;br /&gt;
debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;br /&gt;
debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;br /&gt;
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;br /&gt;
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;br /&gt;
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;br /&gt;
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;br /&gt;
debug1: Host '10.1.5.6' is known and matches the RSA host key.&lt;br /&gt;
debug1: Found key in /root/.ssh/known_hosts:1&lt;br /&gt;
debug1: ssh_rsa_verify: signature correct&lt;br /&gt;
debug1: SSH2_MSG_NEWKEYS sent&lt;br /&gt;
debug1: expecting SSH2_MSG_NEWKEYS&lt;br /&gt;
debug1: SSH2_MSG_NEWKEYS received&lt;br /&gt;
debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;br /&gt;
debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;br /&gt;
debug1: Authentications that can continue: publickey,gssapi-with-mic,password&lt;br /&gt;
debug1: Next authentication method: gssapi-with-mic&lt;br /&gt;
debug1: An invalid name was supplied&lt;br /&gt;
Cannot determine realm for numeric host address&lt;br /&gt;
&lt;br /&gt;
debug1: An invalid name was supplied&lt;br /&gt;
Cannot determine realm for numeric host address&lt;br /&gt;
&lt;br /&gt;
debug1: Next authentication method: publickey&lt;br /&gt;
debug1: Offering public key: /root/.ssh/id_rsa&lt;br /&gt;
debug1: Authentications that can continue: publickey,gssapi-with-mic,password&lt;br /&gt;
debug1: Offering public key: /root/.ssh/id_rsa&lt;br /&gt;
debug1: Server accepts key: pkalg ssh-rsa blen 149&lt;br /&gt;
debug1: read PEM private key done: type RSA&lt;br /&gt;
debug1: Authentication succeeded (publickey).&lt;br /&gt;
debug1: channel 0: new [client-session]&lt;br /&gt;
debug1: Entering interactive session.&lt;br /&gt;
Last login: Thu Aug  9 16:41:30 2007 from 10.1.5.20&lt;br /&gt;
[root@Char ~]# exit&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
Make sure:&lt;br /&gt;
* you have at least one good backup of the virtual machine you intend to migrate&lt;br /&gt;
* rsync is installed on the target host&lt;br /&gt;
* In general you cannot migrate from bigger kernel versions to smaller ones&lt;br /&gt;
* By default, after the migration process is completed, the Container private area and configuration file are '''deleted''' on the old HN. However, if you wish the Container private area on the Source Node to not be removed after the successful Container migration, you can override the default &amp;lt;code&amp;gt;vzmigrate&amp;lt;/code&amp;gt; behavior by using the &amp;lt;code&amp;gt;–r no&amp;lt;/code&amp;gt; switch.&lt;br /&gt;
&lt;br /&gt;
== vzmigrate usage ==&lt;br /&gt;
&lt;br /&gt;
Now that the vzmigrate script will function, a little bit on vzmigrate.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;This program is used for container migration to another node&lt;br /&gt;
Usage:&lt;br /&gt;
vzmigrate [-r yes|no] [--ssh=&amp;lt;options&amp;gt;] [--keep-dst] [--online] [-v]&lt;br /&gt;
        destination_address &amp;lt;CTID&amp;gt;&lt;br /&gt;
Options:&lt;br /&gt;
-r, --remove-area yes|no&lt;br /&gt;
        Whether to remove container on source HN for successfully migrated container.&lt;br /&gt;
--ssh=&amp;lt;ssh options&amp;gt;&lt;br /&gt;
        Additional options that will be passed to ssh while establishing&lt;br /&gt;
        connection to destination HN. Please be careful with options&lt;br /&gt;
        passed, DO NOT pass destination hostname.&lt;br /&gt;
--keep-dst&lt;br /&gt;
        Do not clean synced destination container private area in case of some&lt;br /&gt;
        error. It makes sense to use this option on big container migration to&lt;br /&gt;
        avoid syncing container private area again in case some error&lt;br /&gt;
        (on container stop for example) occurs during first migration attempt.&lt;br /&gt;
--online&lt;br /&gt;
        Perform online (zero-downtime) migration: during the migration the&lt;br /&gt;
        container hangs for a while and after the migration it continues working&lt;br /&gt;
        as though nothing has happened.&lt;br /&gt;
-v&lt;br /&gt;
        Verbose mode. Causes vzmigrate to print debugging messages about&lt;br /&gt;
        its progress (including some time statistics).&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Example ===&lt;br /&gt;
Here is an example of migrating container 101 from the current HN to one at 10.1.5.6:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@OpenVZ .ssh]# vzmigrate 10.1.5.6 101&lt;br /&gt;
OPT:10.1.5.6&lt;br /&gt;
Starting migration of container 101 on 10.1.5.6&lt;br /&gt;
Preparing remote node&lt;br /&gt;
Initializing remote quota&lt;br /&gt;
Syncing private&lt;br /&gt;
Syncing 2nd level quota&lt;br /&gt;
Turning quota off&lt;br /&gt;
Cleanup&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Migrate all running containers ==&lt;br /&gt;
&lt;br /&gt;
Here's a simple shell script that will migrate each container one after another. Just pass the destination host node as the single argument to the script. Feel free to add the -v flag to the vzmigrate flags if you'd like to see it execute with the verbose option:&lt;br /&gt;
&lt;br /&gt;
 for CT in $(vzlist -H -o veid); do vzmigrate --remove-area no --keep-dst $1 $CT; done&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Additional Information ==&lt;br /&gt;
&lt;br /&gt;
You can also use this guide to migrate from OpenVZ to Proxmox VE.&lt;br /&gt;
&lt;br /&gt;
If you use Proxmox VE, you may also want to read how to [http://pve.proxmox.com/wiki/Backup_-_Restore_-_Live_Migration Backup-Restore] a virtual machine, be it OpenVZ or KVM. &lt;br /&gt;
&lt;br /&gt;
[[Category:HOWTO]]&lt;/div&gt;</summary>
		<author><name>Kotakomputer</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.openvz.org/index.php?title=Migration_from_one_HN_to_another&amp;diff=12438</id>
		<title>Migration from one HN to another</title>
		<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=Migration_from_one_HN_to_another&amp;diff=12438"/>
		<updated>2012-05-27T08:07:37Z</updated>

		<summary type="html">&lt;p&gt;Kotakomputer: /* Summary */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{wikify}}&lt;br /&gt;
&lt;br /&gt;
The vzmigrate script is used to migrate a [[container]] from one [[Hardware Node]] to another.&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
&lt;br /&gt;
OLD SERVER:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[root@OpenVZ ~]# ssh-keygen -t rsa&lt;br /&gt;
[root@OpenVZ ~]# cd .ssh/&lt;br /&gt;
[root@OpenVZ .ssh]# scp id_rsa.pub root@10.1.5.6:./id_rsa.pub&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
NEW SERVER:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[root@Char ~]# cd .ssh/&lt;br /&gt;
[root@Char .ssh]# touch authorized_keys2&lt;br /&gt;
[root@Char .ssh]# chmod 600 authorized_keys2&lt;br /&gt;
[root@Char .ssh]# cat ../id_rsa.pub &amp;gt;&amp;gt; authorized_keys2&lt;br /&gt;
[root@Char .ssh]# rm ../id_rsa.pub&lt;br /&gt;
rm: remove regular file `../id_rsa.pub'? y&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
OLD SERVER: (test if we can ssh without password)&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[root@OpenVZ .ssh]# ssh -2 -v root@10.1.5.6&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
OLD SERVER: migrate VM 101 to 10.1.5.6&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[root@OpenVZ .ssh]# vzmigrate 10.1.5.6 101&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Setting up SSH keys ==&lt;br /&gt;
&lt;br /&gt;
You first have to setup SSH to permit the old HN to be able to login to the new HN without a password prompt. Run the following on the old HN.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@OpenVZ ~]# ssh-keygen -t rsa&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/root/.ssh/id_rsa):&lt;br /&gt;
Created directory '/root/.ssh'.&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /root/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /root/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
74:7a:3e:7f:27:2f:42:bb:52:4c:ad:55:31:6f:79:f2 root@OpenVZ.ics.local&lt;br /&gt;
[root@OpenVZ ~]# cd .ssh/&lt;br /&gt;
[root@OpenVZ .ssh]# ls -al&lt;br /&gt;
total 20&lt;br /&gt;
drwx------  2 root root 4096 Aug 11 09:41 .&lt;br /&gt;
drwxr-x---  5 root root 4096 Aug 11 09:40 ..&lt;br /&gt;
-rw-------  1 root root  887 Aug 11 09:41 id_rsa&lt;br /&gt;
-rw-r--r--  1 root root  231 Aug 11 09:41 id_rsa.pub&lt;br /&gt;
[root@OpenVZ .ssh]# scp id_rsa.pub root@10.1.5.6:./id_rsa.pub&lt;br /&gt;
The authenticity of host '10.1.5.6 (10.1.5.6)' can't be established.&lt;br /&gt;
RSA key fingerprint is 3f:2a:26:15:e4:37:e2:06:b8:4d:20:ee:3a:dc:c1:69.&lt;br /&gt;
Are you sure you want to continue connecting (yes/no)? yes&lt;br /&gt;
Warning: Permanently added '10.1.5.6' (RSA) to the list of known hosts.&lt;br /&gt;
root@10.1.5.6's password:&lt;br /&gt;
id_rsa.pub               100%  231     0.2KB/s   00:00&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Run the following on the new HN.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@Char ~]# cd .ssh/&lt;br /&gt;
[root@Char .ssh]# touch authorized_keys2&lt;br /&gt;
[root@Char .ssh]# chmod 600 authorized_keys2&lt;br /&gt;
[root@Char .ssh]# cat ../id_rsa.pub &amp;gt;&amp;gt; authorized_keys2&lt;br /&gt;
[root@Char .ssh]# rm ../id_rsa.pub&lt;br /&gt;
rm: remove regular file `../id_rsa.pub'? y&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Run the following on the old HN.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@OpenVZ .ssh]# ssh -2 -v root@10.1.5.6&lt;br /&gt;
OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19 2003&lt;br /&gt;
debug1: Reading configuration data /etc/ssh/ssh_config&lt;br /&gt;
debug1: Applying options for *&lt;br /&gt;
debug1: Connecting to 10.1.5.6 [10.1.5.6] port 22.&lt;br /&gt;
debug1: Connection established.&lt;br /&gt;
debug1: permanently_set_uid: 0/0&lt;br /&gt;
debug1: identity file /root/.ssh/id_rsa type 1&lt;br /&gt;
debug1: identity file /root/.ssh/id_dsa type -1&lt;br /&gt;
debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3&lt;br /&gt;
debug1: match: OpenSSH_4.3 pat OpenSSH*&lt;br /&gt;
debug1: Enabling compatibility mode for protocol 2.0&lt;br /&gt;
debug1: Local version string SSH-2.0-OpenSSH_3.9p1&lt;br /&gt;
debug1: SSH2_MSG_KEXINIT sent&lt;br /&gt;
debug1: SSH2_MSG_KEXINIT received&lt;br /&gt;
debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;br /&gt;
debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;br /&gt;
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;br /&gt;
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;br /&gt;
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;br /&gt;
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;br /&gt;
debug1: Host '10.1.5.6' is known and matches the RSA host key.&lt;br /&gt;
debug1: Found key in /root/.ssh/known_hosts:1&lt;br /&gt;
debug1: ssh_rsa_verify: signature correct&lt;br /&gt;
debug1: SSH2_MSG_NEWKEYS sent&lt;br /&gt;
debug1: expecting SSH2_MSG_NEWKEYS&lt;br /&gt;
debug1: SSH2_MSG_NEWKEYS received&lt;br /&gt;
debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;br /&gt;
debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;br /&gt;
debug1: Authentications that can continue: publickey,gssapi-with-mic,password&lt;br /&gt;
debug1: Next authentication method: gssapi-with-mic&lt;br /&gt;
debug1: An invalid name was supplied&lt;br /&gt;
Cannot determine realm for numeric host address&lt;br /&gt;
&lt;br /&gt;
debug1: An invalid name was supplied&lt;br /&gt;
Cannot determine realm for numeric host address&lt;br /&gt;
&lt;br /&gt;
debug1: Next authentication method: publickey&lt;br /&gt;
debug1: Offering public key: /root/.ssh/id_rsa&lt;br /&gt;
debug1: Authentications that can continue: publickey,gssapi-with-mic,password&lt;br /&gt;
debug1: Offering public key: /root/.ssh/id_rsa&lt;br /&gt;
debug1: Server accepts key: pkalg ssh-rsa blen 149&lt;br /&gt;
debug1: read PEM private key done: type RSA&lt;br /&gt;
debug1: Authentication succeeded (publickey).&lt;br /&gt;
debug1: channel 0: new [client-session]&lt;br /&gt;
debug1: Entering interactive session.&lt;br /&gt;
Last login: Thu Aug  9 16:41:30 2007 from 10.1.5.20&lt;br /&gt;
[root@Char ~]# exit&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
Make sure:&lt;br /&gt;
* you have at least one good backup of the virtual machine you intend to migrate&lt;br /&gt;
* rsync is installed on the target host&lt;br /&gt;
* In general you cannot migrate from bigger kernel versions to smaller ones&lt;br /&gt;
* By default, after the migration process is completed, the Container private area and configuration file are '''deleted''' on the old HN. However, if you wish the Container private area on the Source Node to not be removed after the successful Container migration, you can override the default &amp;lt;code&amp;gt;vzmigrate&amp;lt;/code&amp;gt; behavior by using the &amp;lt;code&amp;gt;–r no&amp;lt;/code&amp;gt; switch.&lt;br /&gt;
&lt;br /&gt;
== vzmigrate usage ==&lt;br /&gt;
&lt;br /&gt;
Now that the vzmigrate script will function, a little bit on vzmigrate.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;This program is used for container migration to another node&lt;br /&gt;
Usage:&lt;br /&gt;
vzmigrate [-r yes|no] [--ssh=&amp;lt;options&amp;gt;] [--keep-dst] [--online] [-v]&lt;br /&gt;
        destination_address &amp;lt;CTID&amp;gt;&lt;br /&gt;
Options:&lt;br /&gt;
-r, --remove-area yes|no&lt;br /&gt;
        Whether to remove container on source HN for successfully migrated container.&lt;br /&gt;
--ssh=&amp;lt;ssh options&amp;gt;&lt;br /&gt;
        Additional options that will be passed to ssh while establishing&lt;br /&gt;
        connection to destination HN. Please be careful with options&lt;br /&gt;
        passed, DO NOT pass destination hostname.&lt;br /&gt;
--keep-dst&lt;br /&gt;
        Do not clean synced destination container private area in case of some&lt;br /&gt;
        error. It makes sense to use this option on big container migration to&lt;br /&gt;
        avoid syncing container private area again in case some error&lt;br /&gt;
        (on container stop for example) occurs during first migration attempt.&lt;br /&gt;
--online&lt;br /&gt;
        Perform online (zero-downtime) migration: during the migration the&lt;br /&gt;
        container hangs for a while and after the migration it continues working&lt;br /&gt;
        as though nothing has happened.&lt;br /&gt;
-v&lt;br /&gt;
        Verbose mode. Causes vzmigrate to print debugging messages about&lt;br /&gt;
        its progress (including some time statistics).&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Example ===&lt;br /&gt;
Here is an example of migrating container 101 from the current HN to one at 10.1.5.6:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@OpenVZ .ssh]# vzmigrate 10.1.5.6 101&lt;br /&gt;
OPT:10.1.5.6&lt;br /&gt;
Starting migration of container 101 on 10.1.5.6&lt;br /&gt;
Preparing remote node&lt;br /&gt;
Initializing remote quota&lt;br /&gt;
Syncing private&lt;br /&gt;
Syncing 2nd level quota&lt;br /&gt;
Turning quota off&lt;br /&gt;
Cleanup&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Migrate all running containers ==&lt;br /&gt;
&lt;br /&gt;
Here's a simple shell script that will migrate each container one after another. Just pass the destination host node as the single argument to the script. Feel free to add the -v flag to the vzmigrate flags if you'd like to see it execute with the verbose option:&lt;br /&gt;
&lt;br /&gt;
 for CT in $(vzlist -H -o veid); do vzmigrate --remove-area no --keep-dst $1 $CT; done&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Additional Information ==&lt;br /&gt;
&lt;br /&gt;
You can also use this guide to migrate from OpenVZ to Proxmox VE.&lt;br /&gt;
&lt;br /&gt;
If you use Proxmox VE, you may also want to read how to [http://pve.proxmox.com/wiki/Backup_-_Restore_-_Live_Migration Backup-Restore] a virtual machine, be it OpenVZ or KVM. &lt;br /&gt;
&lt;br /&gt;
[[Category:HOWTO]]&lt;/div&gt;</summary>
		<author><name>Kotakomputer</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.openvz.org/index.php?title=Migration_from_one_HN_to_another&amp;diff=12437</id>
		<title>Migration from one HN to another</title>
		<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=Migration_from_one_HN_to_another&amp;diff=12437"/>
		<updated>2012-05-27T08:05:39Z</updated>

		<summary type="html">&lt;p&gt;Kotakomputer: /* Summary */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{wikify}}&lt;br /&gt;
&lt;br /&gt;
The vzmigrate script is used to migrate a [[container]] from one [[Hardware Node]] to another.&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
&lt;br /&gt;
OLD SERVER:&lt;br /&gt;
[root@OpenVZ ~]# ssh-keygen -t rsa&lt;br /&gt;
[root@OpenVZ ~]# cd .ssh/&lt;br /&gt;
[root@OpenVZ .ssh]# scp id_rsa.pub root@10.1.5.6:./id_rsa.pub&lt;br /&gt;
&lt;br /&gt;
NEW SERVER:&lt;br /&gt;
[root@Char ~]# cd .ssh/&lt;br /&gt;
[root@Char .ssh]# touch authorized_keys2&lt;br /&gt;
[root@Char .ssh]# chmod 600 authorized_keys2&lt;br /&gt;
[root@Char .ssh]# cat ../id_rsa.pub &amp;gt;&amp;gt; authorized_keys2&lt;br /&gt;
[root@Char .ssh]# rm ../id_rsa.pub&lt;br /&gt;
rm: remove regular file `../id_rsa.pub'? y&lt;br /&gt;
&lt;br /&gt;
OLD SERVER: (test if we can ssh without password)&lt;br /&gt;
[root@OpenVZ .ssh]# ssh -2 -v root@10.1.5.6&lt;br /&gt;
&lt;br /&gt;
OLD SERVER: migrate VM 101 to 10.1.5.6&lt;br /&gt;
[root@OpenVZ .ssh]# vzmigrate 10.1.5.6 101&lt;br /&gt;
&lt;br /&gt;
== Setting up SSH keys ==&lt;br /&gt;
&lt;br /&gt;
You first have to setup SSH to permit the old HN to be able to login to the new HN without a password prompt. Run the following on the old HN.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@OpenVZ ~]# ssh-keygen -t rsa&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/root/.ssh/id_rsa):&lt;br /&gt;
Created directory '/root/.ssh'.&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /root/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /root/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
74:7a:3e:7f:27:2f:42:bb:52:4c:ad:55:31:6f:79:f2 root@OpenVZ.ics.local&lt;br /&gt;
[root@OpenVZ ~]# cd .ssh/&lt;br /&gt;
[root@OpenVZ .ssh]# ls -al&lt;br /&gt;
total 20&lt;br /&gt;
drwx------  2 root root 4096 Aug 11 09:41 .&lt;br /&gt;
drwxr-x---  5 root root 4096 Aug 11 09:40 ..&lt;br /&gt;
-rw-------  1 root root  887 Aug 11 09:41 id_rsa&lt;br /&gt;
-rw-r--r--  1 root root  231 Aug 11 09:41 id_rsa.pub&lt;br /&gt;
[root@OpenVZ .ssh]# scp id_rsa.pub root@10.1.5.6:./id_rsa.pub&lt;br /&gt;
The authenticity of host '10.1.5.6 (10.1.5.6)' can't be established.&lt;br /&gt;
RSA key fingerprint is 3f:2a:26:15:e4:37:e2:06:b8:4d:20:ee:3a:dc:c1:69.&lt;br /&gt;
Are you sure you want to continue connecting (yes/no)? yes&lt;br /&gt;
Warning: Permanently added '10.1.5.6' (RSA) to the list of known hosts.&lt;br /&gt;
root@10.1.5.6's password:&lt;br /&gt;
id_rsa.pub               100%  231     0.2KB/s   00:00&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Run the following on the new HN.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@Char ~]# cd .ssh/&lt;br /&gt;
[root@Char .ssh]# touch authorized_keys2&lt;br /&gt;
[root@Char .ssh]# chmod 600 authorized_keys2&lt;br /&gt;
[root@Char .ssh]# cat ../id_rsa.pub &amp;gt;&amp;gt; authorized_keys2&lt;br /&gt;
[root@Char .ssh]# rm ../id_rsa.pub&lt;br /&gt;
rm: remove regular file `../id_rsa.pub'? y&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Run the following on the old HN.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@OpenVZ .ssh]# ssh -2 -v root@10.1.5.6&lt;br /&gt;
OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19 2003&lt;br /&gt;
debug1: Reading configuration data /etc/ssh/ssh_config&lt;br /&gt;
debug1: Applying options for *&lt;br /&gt;
debug1: Connecting to 10.1.5.6 [10.1.5.6] port 22.&lt;br /&gt;
debug1: Connection established.&lt;br /&gt;
debug1: permanently_set_uid: 0/0&lt;br /&gt;
debug1: identity file /root/.ssh/id_rsa type 1&lt;br /&gt;
debug1: identity file /root/.ssh/id_dsa type -1&lt;br /&gt;
debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3&lt;br /&gt;
debug1: match: OpenSSH_4.3 pat OpenSSH*&lt;br /&gt;
debug1: Enabling compatibility mode for protocol 2.0&lt;br /&gt;
debug1: Local version string SSH-2.0-OpenSSH_3.9p1&lt;br /&gt;
debug1: SSH2_MSG_KEXINIT sent&lt;br /&gt;
debug1: SSH2_MSG_KEXINIT received&lt;br /&gt;
debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;br /&gt;
debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;br /&gt;
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;br /&gt;
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;br /&gt;
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;br /&gt;
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;br /&gt;
debug1: Host '10.1.5.6' is known and matches the RSA host key.&lt;br /&gt;
debug1: Found key in /root/.ssh/known_hosts:1&lt;br /&gt;
debug1: ssh_rsa_verify: signature correct&lt;br /&gt;
debug1: SSH2_MSG_NEWKEYS sent&lt;br /&gt;
debug1: expecting SSH2_MSG_NEWKEYS&lt;br /&gt;
debug1: SSH2_MSG_NEWKEYS received&lt;br /&gt;
debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;br /&gt;
debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;br /&gt;
debug1: Authentications that can continue: publickey,gssapi-with-mic,password&lt;br /&gt;
debug1: Next authentication method: gssapi-with-mic&lt;br /&gt;
debug1: An invalid name was supplied&lt;br /&gt;
Cannot determine realm for numeric host address&lt;br /&gt;
&lt;br /&gt;
debug1: An invalid name was supplied&lt;br /&gt;
Cannot determine realm for numeric host address&lt;br /&gt;
&lt;br /&gt;
debug1: Next authentication method: publickey&lt;br /&gt;
debug1: Offering public key: /root/.ssh/id_rsa&lt;br /&gt;
debug1: Authentications that can continue: publickey,gssapi-with-mic,password&lt;br /&gt;
debug1: Offering public key: /root/.ssh/id_rsa&lt;br /&gt;
debug1: Server accepts key: pkalg ssh-rsa blen 149&lt;br /&gt;
debug1: read PEM private key done: type RSA&lt;br /&gt;
debug1: Authentication succeeded (publickey).&lt;br /&gt;
debug1: channel 0: new [client-session]&lt;br /&gt;
debug1: Entering interactive session.&lt;br /&gt;
Last login: Thu Aug  9 16:41:30 2007 from 10.1.5.20&lt;br /&gt;
[root@Char ~]# exit&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
Make sure:&lt;br /&gt;
* you have at least one good backup of the virtual machine you intend to migrate&lt;br /&gt;
* rsync is installed on the target host&lt;br /&gt;
* In general you cannot migrate from bigger kernel versions to smaller ones&lt;br /&gt;
* By default, after the migration process is completed, the Container private area and configuration file are '''deleted''' on the old HN. However, if you wish the Container private area on the Source Node to not be removed after the successful Container migration, you can override the default &amp;lt;code&amp;gt;vzmigrate&amp;lt;/code&amp;gt; behavior by using the &amp;lt;code&amp;gt;–r no&amp;lt;/code&amp;gt; switch.&lt;br /&gt;
&lt;br /&gt;
== vzmigrate usage ==&lt;br /&gt;
&lt;br /&gt;
Now that the vzmigrate script will function, a little bit on vzmigrate.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;This program is used for container migration to another node&lt;br /&gt;
Usage:&lt;br /&gt;
vzmigrate [-r yes|no] [--ssh=&amp;lt;options&amp;gt;] [--keep-dst] [--online] [-v]&lt;br /&gt;
        destination_address &amp;lt;CTID&amp;gt;&lt;br /&gt;
Options:&lt;br /&gt;
-r, --remove-area yes|no&lt;br /&gt;
        Whether to remove container on source HN for successfully migrated container.&lt;br /&gt;
--ssh=&amp;lt;ssh options&amp;gt;&lt;br /&gt;
        Additional options that will be passed to ssh while establishing&lt;br /&gt;
        connection to destination HN. Please be careful with options&lt;br /&gt;
        passed, DO NOT pass destination hostname.&lt;br /&gt;
--keep-dst&lt;br /&gt;
        Do not clean synced destination container private area in case of some&lt;br /&gt;
        error. It makes sense to use this option on big container migration to&lt;br /&gt;
        avoid syncing container private area again in case some error&lt;br /&gt;
        (on container stop for example) occurs during first migration attempt.&lt;br /&gt;
--online&lt;br /&gt;
        Perform online (zero-downtime) migration: during the migration the&lt;br /&gt;
        container hangs for a while and after the migration it continues working&lt;br /&gt;
        as though nothing has happened.&lt;br /&gt;
-v&lt;br /&gt;
        Verbose mode. Causes vzmigrate to print debugging messages about&lt;br /&gt;
        its progress (including some time statistics).&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Example ===&lt;br /&gt;
Here is an example of migrating container 101 from the current HN to one at 10.1.5.6:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@OpenVZ .ssh]# vzmigrate 10.1.5.6 101&lt;br /&gt;
OPT:10.1.5.6&lt;br /&gt;
Starting migration of container 101 on 10.1.5.6&lt;br /&gt;
Preparing remote node&lt;br /&gt;
Initializing remote quota&lt;br /&gt;
Syncing private&lt;br /&gt;
Syncing 2nd level quota&lt;br /&gt;
Turning quota off&lt;br /&gt;
Cleanup&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Migrate all running containers ==&lt;br /&gt;
&lt;br /&gt;
Here's a simple shell script that will migrate each container one after another. Just pass the destination host node as the single argument to the script. Feel free to add the -v flag to the vzmigrate flags if you'd like to see it execute with the verbose option:&lt;br /&gt;
&lt;br /&gt;
 for CT in $(vzlist -H -o veid); do vzmigrate --remove-area no --keep-dst $1 $CT; done&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Additional Information ==&lt;br /&gt;
&lt;br /&gt;
You can also use this guide to migrate from OpenVZ to Proxmox VE.&lt;br /&gt;
&lt;br /&gt;
If you use Proxmox VE, you may also want to read how to [http://pve.proxmox.com/wiki/Backup_-_Restore_-_Live_Migration Backup-Restore] a virtual machine, be it OpenVZ or KVM. &lt;br /&gt;
&lt;br /&gt;
[[Category:HOWTO]]&lt;/div&gt;</summary>
		<author><name>Kotakomputer</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.openvz.org/index.php?title=Migration_from_one_HN_to_another&amp;diff=12436</id>
		<title>Migration from one HN to another</title>
		<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=Migration_from_one_HN_to_another&amp;diff=12436"/>
		<updated>2012-05-27T07:48:56Z</updated>

		<summary type="html">&lt;p&gt;Kotakomputer: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{wikify}}&lt;br /&gt;
&lt;br /&gt;
The vzmigrate script is used to migrate a [[container]] from one [[Hardware Node]] to another.&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Setting up SSH keys ==&lt;br /&gt;
&lt;br /&gt;
You first have to setup SSH to permit the old HN to be able to login to the new HN without a password prompt. Run the following on the old HN.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@OpenVZ ~]# ssh-keygen -t rsa&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/root/.ssh/id_rsa):&lt;br /&gt;
Created directory '/root/.ssh'.&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /root/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /root/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
74:7a:3e:7f:27:2f:42:bb:52:4c:ad:55:31:6f:79:f2 root@OpenVZ.ics.local&lt;br /&gt;
[root@OpenVZ ~]# cd .ssh/&lt;br /&gt;
[root@OpenVZ .ssh]# ls -al&lt;br /&gt;
total 20&lt;br /&gt;
drwx------  2 root root 4096 Aug 11 09:41 .&lt;br /&gt;
drwxr-x---  5 root root 4096 Aug 11 09:40 ..&lt;br /&gt;
-rw-------  1 root root  887 Aug 11 09:41 id_rsa&lt;br /&gt;
-rw-r--r--  1 root root  231 Aug 11 09:41 id_rsa.pub&lt;br /&gt;
[root@OpenVZ .ssh]# scp id_rsa.pub root@10.1.5.6:./id_rsa.pub&lt;br /&gt;
The authenticity of host '10.1.5.6 (10.1.5.6)' can't be established.&lt;br /&gt;
RSA key fingerprint is 3f:2a:26:15:e4:37:e2:06:b8:4d:20:ee:3a:dc:c1:69.&lt;br /&gt;
Are you sure you want to continue connecting (yes/no)? yes&lt;br /&gt;
Warning: Permanently added '10.1.5.6' (RSA) to the list of known hosts.&lt;br /&gt;
root@10.1.5.6's password:&lt;br /&gt;
id_rsa.pub               100%  231     0.2KB/s   00:00&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Run the following on the new HN.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@Char ~]# cd .ssh/&lt;br /&gt;
[root@Char .ssh]# touch authorized_keys2&lt;br /&gt;
[root@Char .ssh]# chmod 600 authorized_keys2&lt;br /&gt;
[root@Char .ssh]# cat ../id_rsa.pub &amp;gt;&amp;gt; authorized_keys2&lt;br /&gt;
[root@Char .ssh]# rm ../id_rsa.pub&lt;br /&gt;
rm: remove regular file `../id_rsa.pub'? y&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Run the following on the old HN.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@OpenVZ .ssh]# ssh -2 -v root@10.1.5.6&lt;br /&gt;
OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19 2003&lt;br /&gt;
debug1: Reading configuration data /etc/ssh/ssh_config&lt;br /&gt;
debug1: Applying options for *&lt;br /&gt;
debug1: Connecting to 10.1.5.6 [10.1.5.6] port 22.&lt;br /&gt;
debug1: Connection established.&lt;br /&gt;
debug1: permanently_set_uid: 0/0&lt;br /&gt;
debug1: identity file /root/.ssh/id_rsa type 1&lt;br /&gt;
debug1: identity file /root/.ssh/id_dsa type -1&lt;br /&gt;
debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3&lt;br /&gt;
debug1: match: OpenSSH_4.3 pat OpenSSH*&lt;br /&gt;
debug1: Enabling compatibility mode for protocol 2.0&lt;br /&gt;
debug1: Local version string SSH-2.0-OpenSSH_3.9p1&lt;br /&gt;
debug1: SSH2_MSG_KEXINIT sent&lt;br /&gt;
debug1: SSH2_MSG_KEXINIT received&lt;br /&gt;
debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;br /&gt;
debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;br /&gt;
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;br /&gt;
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;br /&gt;
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;br /&gt;
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;br /&gt;
debug1: Host '10.1.5.6' is known and matches the RSA host key.&lt;br /&gt;
debug1: Found key in /root/.ssh/known_hosts:1&lt;br /&gt;
debug1: ssh_rsa_verify: signature correct&lt;br /&gt;
debug1: SSH2_MSG_NEWKEYS sent&lt;br /&gt;
debug1: expecting SSH2_MSG_NEWKEYS&lt;br /&gt;
debug1: SSH2_MSG_NEWKEYS received&lt;br /&gt;
debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;br /&gt;
debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;br /&gt;
debug1: Authentications that can continue: publickey,gssapi-with-mic,password&lt;br /&gt;
debug1: Next authentication method: gssapi-with-mic&lt;br /&gt;
debug1: An invalid name was supplied&lt;br /&gt;
Cannot determine realm for numeric host address&lt;br /&gt;
&lt;br /&gt;
debug1: An invalid name was supplied&lt;br /&gt;
Cannot determine realm for numeric host address&lt;br /&gt;
&lt;br /&gt;
debug1: Next authentication method: publickey&lt;br /&gt;
debug1: Offering public key: /root/.ssh/id_rsa&lt;br /&gt;
debug1: Authentications that can continue: publickey,gssapi-with-mic,password&lt;br /&gt;
debug1: Offering public key: /root/.ssh/id_rsa&lt;br /&gt;
debug1: Server accepts key: pkalg ssh-rsa blen 149&lt;br /&gt;
debug1: read PEM private key done: type RSA&lt;br /&gt;
debug1: Authentication succeeded (publickey).&lt;br /&gt;
debug1: channel 0: new [client-session]&lt;br /&gt;
debug1: Entering interactive session.&lt;br /&gt;
Last login: Thu Aug  9 16:41:30 2007 from 10.1.5.20&lt;br /&gt;
[root@Char ~]# exit&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
Make sure:&lt;br /&gt;
* you have at least one good backup of the virtual machine you intend to migrate&lt;br /&gt;
* rsync is installed on the target host&lt;br /&gt;
* In general you cannot migrate from bigger kernel versions to smaller ones&lt;br /&gt;
* By default, after the migration process is completed, the Container private area and configuration file are '''deleted''' on the old HN. However, if you wish the Container private area on the Source Node to not be removed after the successful Container migration, you can override the default &amp;lt;code&amp;gt;vzmigrate&amp;lt;/code&amp;gt; behavior by using the &amp;lt;code&amp;gt;–r no&amp;lt;/code&amp;gt; switch.&lt;br /&gt;
&lt;br /&gt;
== vzmigrate usage ==&lt;br /&gt;
&lt;br /&gt;
Now that the vzmigrate script will function, a little bit on vzmigrate.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;This program is used for container migration to another node&lt;br /&gt;
Usage:&lt;br /&gt;
vzmigrate [-r yes|no] [--ssh=&amp;lt;options&amp;gt;] [--keep-dst] [--online] [-v]&lt;br /&gt;
        destination_address &amp;lt;CTID&amp;gt;&lt;br /&gt;
Options:&lt;br /&gt;
-r, --remove-area yes|no&lt;br /&gt;
        Whether to remove container on source HN for successfully migrated container.&lt;br /&gt;
--ssh=&amp;lt;ssh options&amp;gt;&lt;br /&gt;
        Additional options that will be passed to ssh while establishing&lt;br /&gt;
        connection to destination HN. Please be careful with options&lt;br /&gt;
        passed, DO NOT pass destination hostname.&lt;br /&gt;
--keep-dst&lt;br /&gt;
        Do not clean synced destination container private area in case of some&lt;br /&gt;
        error. It makes sense to use this option on big container migration to&lt;br /&gt;
        avoid syncing container private area again in case some error&lt;br /&gt;
        (on container stop for example) occurs during first migration attempt.&lt;br /&gt;
--online&lt;br /&gt;
        Perform online (zero-downtime) migration: during the migration the&lt;br /&gt;
        container hangs for a while and after the migration it continues working&lt;br /&gt;
        as though nothing has happened.&lt;br /&gt;
-v&lt;br /&gt;
        Verbose mode. Causes vzmigrate to print debugging messages about&lt;br /&gt;
        its progress (including some time statistics).&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Example ===&lt;br /&gt;
Here is an example of migrating container 101 from the current HN to one at 10.1.5.6:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[root@OpenVZ .ssh]# vzmigrate 10.1.5.6 101&lt;br /&gt;
OPT:10.1.5.6&lt;br /&gt;
Starting migration of container 101 on 10.1.5.6&lt;br /&gt;
Preparing remote node&lt;br /&gt;
Initializing remote quota&lt;br /&gt;
Syncing private&lt;br /&gt;
Syncing 2nd level quota&lt;br /&gt;
Turning quota off&lt;br /&gt;
Cleanup&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Migrate all running containers ==&lt;br /&gt;
&lt;br /&gt;
Here's a simple shell script that will migrate each container one after another. Just pass the destination host node as the single argument to the script. Feel free to add the -v flag to the vzmigrate flags if you'd like to see it execute with the verbose option:&lt;br /&gt;
&lt;br /&gt;
 for CT in $(vzlist -H -o veid); do vzmigrate --remove-area no --keep-dst $1 $CT; done&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Additional Information ==&lt;br /&gt;
&lt;br /&gt;
You can also use this guide to migrate from OpenVZ to Proxmox VE.&lt;br /&gt;
&lt;br /&gt;
If you use Proxmox VE, you may also want to read how to [http://pve.proxmox.com/wiki/Backup_-_Restore_-_Live_Migration Backup-Restore] a virtual machine, be it OpenVZ or KVM. &lt;br /&gt;
&lt;br /&gt;
[[Category:HOWTO]]&lt;/div&gt;</summary>
		<author><name>Kotakomputer</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.openvz.org/index.php?title=Control_panels&amp;diff=12435</id>
		<title>Control panels</title>
		<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=Control_panels&amp;diff=12435"/>
		<updated>2012-05-26T14:12:13Z</updated>

		<summary type="html">&lt;p&gt;Kotakomputer: /* Free software / Open source (in alphabetical order) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains links to different control panels for OpenVZ, written by third parties. If you know the project that's missing here, please add it.&lt;br /&gt;
&lt;br /&gt;
== Free software / Open source (in alphabetical order) ==&lt;br /&gt;
* BoxCtrl-VZ [http://www.boxctrl.com homepage] - Free and open source. Uses PHP, XML, and bash scripts. Lightweight. Released on Feb. 18th, 2012.&lt;br /&gt;
* FOSVM (Free Open Source Virtual Machine manager): [http://fosvm.sourceforge.net/ homepage] |  Uses php and bash scripts, monitors bandwidth, Version 0.03a. Last updated 2009-05-18.&lt;br /&gt;
* HyperVM: [http://lxcenter.org/software/hypervm/ homepage] AGPL V3&lt;br /&gt;
* MiniCloud: [https://github.com/ryandoyle/minicloud homepage] | A set of client/server programs that provides similar functionality to the EC2 CLI tools for OpenVZ.&lt;br /&gt;
* OpenNode: [http://opennode.activesys.org/ homepage (English)] - Bare-metal ISO installer (CentOS based) providing openvz, kvm, libvirt and func out-of-box together with OpenNode Management Server appliance - containing also ajax Web Management Console with secure HTML5 vnc and ssh vm consoles.&lt;br /&gt;
* OpenVZ Web Panel [http://code.google.com/p/ovz-web-panel/ homepage] - Version 2.1. Written on Ruby. Automatic installer, backup/restore/clone, pretty interface with charts, multi-user/roles/server/lingual support, user requests, event logging and all NEW: remote API, IP management and VZ migrations. Version 2.1 released on 2012-05-02. Very active development. &lt;br /&gt;
* Proxmox Virtual Environment: [http://pve.proxmox.com Proxmox VE Wiki] - including bare-metal ISO installer. Requires 64bit Processor.&lt;br /&gt;
* SLKVM [http://solukom.com/software/slkvm homepage]: console scripts to handle vz virtualization in a two node cluster.&lt;br /&gt;
* unxsVZ OpenVZ Infrastructure Manager: [http://openisp.net/openisp/unxsVZ unxsVZ Trac Wiki] | Includes autonomic UBC adjusting and per container traffic graphs. Supports hot-spare clones and mount/umount conf file templates. Very active development. Last change to public svn code base July 24, 2011. &lt;br /&gt;
* VirtuoCP ( formerly Vtonf): [http://sourceforge.net/projects/vtonf/ homepage] | According to the documentation only runs on CentOS 4.5 or higher. Last update 2008-05-18.&lt;br /&gt;
&lt;br /&gt;
== Proprietary / non-free ==&lt;br /&gt;
* Aventurin{e}: [http://www.aventurin.net/ homepage (English)]&lt;br /&gt;
* FluidVM: [http://www.fluidvm.com Home Page] free (trial) for up to 5 VE's&lt;br /&gt;
* NGASI: [http://www.ngasi.com/cloud/cp/index.zul homepage] is the Out-of-the-Box Platform-as-a-Service (PaaS) Solution. Quickly and easily create a cloud based P-a-a-S with 2 or more Virtuzzo/OpenVZ servers.&lt;br /&gt;
* oVZManager [http://www.ovzmanager.de homepage (Webinterface German and English)] Terminal and Rescue, IPv6 - Admin, Reseller, Customer - Windows Support over KVM -Free 30 day trial&lt;br /&gt;
* Plesk [http://www.parallels.com/plesk homepage], a control panel from Parallels.&lt;br /&gt;
* SolusVM [http://www.solusvm.com homepage], Appears to be reasonably priced. Also supports KVM, Xen PV &amp;amp; HVM. Soluslabs Ltd (the company behind SolusVM) announced SolusVM hosts over 153,000 OpenVZ containers across it's clientbase (stats October 2011). Highly maintained, Free 15 day trial &amp;amp; 24/7 support included in license fee. '''Now includes support for VSwap'''&lt;br /&gt;
* Sysvm :[http://sysvm.com Home Page], The Enterprise hybrid vps control panel with ipv6 and load balancing,formally known as vcPanel . It is the first centralized VPS control panel for managing VPS around the globe [http://sysvm.com/Demo Demo] 15 day free trial&lt;br /&gt;
* TekBASE: [http://teklab.de/ homepage /German)] Admin, Customer panel for openvz, game, stream and voice servers&lt;br /&gt;
* VDSmanager for Linux :[http://ispsystem.com/en/software/vdsmanager/ homepage (English)]&lt;br /&gt;
* vePortal: [http://www.veportal.com/ homepage (English)] - Widely used OpenVZ Management Panel.&lt;br /&gt;
* VirtPanel [http://www.virtpanel.com homepage], Support for Xen and VMware in the future.&lt;br /&gt;
* Virtualizor [http://www.virtualizor.com homepage] by Softaculous. Also supports Xen PV &amp;amp; HVM&lt;br /&gt;
* VZMaster [http://www.vzmaster.com homepage], [http://www.vzmaster.com/downloads/usermanual_vzmaster_1.0.0.pdf User Manual] -- We also provide complete OpenVz Distro based on Ubuntu Server distribution.&lt;br /&gt;
&lt;br /&gt;
== Frozen projects ==&lt;br /&gt;
* EasyVZ: [http://easyvz.sourceforge.net/ screenshots] | [http://sourceforge.net/projects/easyvz sf.net project page] (little bit outdated, but working and free.  Last update Feb 2007) (requires Unix/Linux)&lt;br /&gt;
* Mwamko: [http://mwamko.org/ homepage] Last activity May 2007&lt;br /&gt;
* RoboVZ: [http://sharesource.org/project/robovz homepage] {{forum|2559}} Lots of promises since announced in May 2007, nothing usable yet.  Possibly GPL license.  No activity in 2 years, calling it frozen.&lt;br /&gt;
* vpsAdmin (www.vpsadmin.org) - GPLv3 license, PHP+MySQL+Bash, Multi-server &amp;amp; Multilingual support, vpsAdmin 1.0 released on January 19, 2010&lt;br /&gt;
* VZ-Manager: [http://vzmanager.de/ homepage (German)] website shows apache default page (11. 02. 2010)&lt;br /&gt;
* WebVZ: [http://webvz.sourceforge.net/ homepage] Version 2.0 released September 7, 2008 (Moved to [https://github.com/shuaibzahda/webvz/commits/master GitHub], last commit 2009-03-20). Requires Ruby on Rails.&lt;br /&gt;
* Webmin: [http://www.webmin.com/ homepage] | [http://www.webmin.com/cgi-bin/search_third.cgi?search=OpenVZ OpenVZ plugin] | Version 1.0, last updated 2006-02-07&lt;br /&gt;
* Panenthe: [http://www.panenthe.com/ homepage (English)] • [http://www.panenthe.com/products/panenthe-media/cat_id=4/ Screen shots] &amp;lt;- does not exist anymore since 2010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In development ==&lt;br /&gt;
* easyVZ! [http://www.easyVZ.org/ homepage] &lt;br /&gt;
* DTC-Xen [http://www.gplhost.com/software-dtc-xen.html homepage] - Currently being ported to OpenVZ by its main developers.&lt;/div&gt;</summary>
		<author><name>Kotakomputer</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.openvz.org/index.php?title=Control_panels&amp;diff=12434</id>
		<title>Control panels</title>
		<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=Control_panels&amp;diff=12434"/>
		<updated>2012-05-26T14:09:30Z</updated>

		<summary type="html">&lt;p&gt;Kotakomputer: /* Free software / Open source (in alphabetical order) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains links to different control panels for OpenVZ, written by third parties. If you know the project that's missing here, please add it.&lt;br /&gt;
&lt;br /&gt;
== Free software / Open source (in alphabetical order) ==&lt;br /&gt;
* BoxCtrl-VZ [http://www.boxctrl.com homepage] - Free and open source. Uses PHP, XML, and bash scripts. Lightweight. Released on Feb. 18th, 2012.&lt;br /&gt;
* FOSVM (Free Open Source Virtual Machine manager): [http://fosvm.sourceforge.net/ homepage] |  Uses php and bash scripts, monitors bandwidth, Version 0.03a. Last updated 2009-05-18.&lt;br /&gt;
* HyperVM: [http://lxcenter.org/software/hypervm/ homepage] AGPL V3&lt;br /&gt;
* MiniCloud: [https://github.com/ryandoyle/minicloud homepage] | A set of client/server programs that provides similar functionality to the EC2 CLI tools for OpenVZ.&lt;br /&gt;
* OpenNode: [http://opennode.activesys.org/ homepage (English)] - Bare-metal ISO installer (CentOS based) providing openvz, kvm, libvirt and func out-of-box together with OpenNode Management Server appliance - containing also ajax Web Management Console with secure HTML5 vnc and ssh vm consoles.&lt;br /&gt;
* OpenVZ Web Panel [http://code.google.com/p/ovz-web-panel/ homepage] - Version 2.1. Written on Ruby. Automatic installer, backup/restore/clone, pretty interface with charts, multi-user/roles/server/lingual support, user requests, event logging and all NEW: remote API, IP management and VZ migrations. Version 2.1 released on 20012-05-02. Very active development. &lt;br /&gt;
* Proxmox Virtual Environment: [http://pve.proxmox.com Proxmox VE Wiki] - including bare-metal ISO installer. Requires 64bit Processor.&lt;br /&gt;
* SLKVM [http://solukom.com/software/slkvm homepage]: console scripts to handle vz virtualization in a two node cluster.&lt;br /&gt;
* unxsVZ OpenVZ Infrastructure Manager: [http://openisp.net/openisp/unxsVZ unxsVZ Trac Wiki] | Includes autonomic UBC adjusting and per container traffic graphs. Supports hot-spare clones and mount/umount conf file templates. Very active development. Last change to public svn code base July 24, 2011. &lt;br /&gt;
* VirtuoCP ( formerly Vtonf): [http://sourceforge.net/projects/vtonf/ homepage] | According to the documentation only runs on CentOS 4.5 or higher. Last update 2008-05-18.&lt;br /&gt;
&lt;br /&gt;
== Proprietary / non-free ==&lt;br /&gt;
* Aventurin{e}: [http://www.aventurin.net/ homepage (English)]&lt;br /&gt;
* FluidVM: [http://www.fluidvm.com Home Page] free (trial) for up to 5 VE's&lt;br /&gt;
* NGASI: [http://www.ngasi.com/cloud/cp/index.zul homepage] is the Out-of-the-Box Platform-as-a-Service (PaaS) Solution. Quickly and easily create a cloud based P-a-a-S with 2 or more Virtuzzo/OpenVZ servers.&lt;br /&gt;
* oVZManager [http://www.ovzmanager.de homepage (Webinterface German and English)] Terminal and Rescue, IPv6 - Admin, Reseller, Customer - Windows Support over KVM -Free 30 day trial&lt;br /&gt;
* Plesk [http://www.parallels.com/plesk homepage], a control panel from Parallels.&lt;br /&gt;
* SolusVM [http://www.solusvm.com homepage], Appears to be reasonably priced. Also supports KVM, Xen PV &amp;amp; HVM. Soluslabs Ltd (the company behind SolusVM) announced SolusVM hosts over 153,000 OpenVZ containers across it's clientbase (stats October 2011). Highly maintained, Free 15 day trial &amp;amp; 24/7 support included in license fee. '''Now includes support for VSwap'''&lt;br /&gt;
* Sysvm :[http://sysvm.com Home Page], The Enterprise hybrid vps control panel with ipv6 and load balancing,formally known as vcPanel . It is the first centralized VPS control panel for managing VPS around the globe [http://sysvm.com/Demo Demo] 15 day free trial&lt;br /&gt;
* TekBASE: [http://teklab.de/ homepage /German)] Admin, Customer panel for openvz, game, stream and voice servers&lt;br /&gt;
* VDSmanager for Linux :[http://ispsystem.com/en/software/vdsmanager/ homepage (English)]&lt;br /&gt;
* vePortal: [http://www.veportal.com/ homepage (English)] - Widely used OpenVZ Management Panel.&lt;br /&gt;
* VirtPanel [http://www.virtpanel.com homepage], Support for Xen and VMware in the future.&lt;br /&gt;
* Virtualizor [http://www.virtualizor.com homepage] by Softaculous. Also supports Xen PV &amp;amp; HVM&lt;br /&gt;
* VZMaster [http://www.vzmaster.com homepage], [http://www.vzmaster.com/downloads/usermanual_vzmaster_1.0.0.pdf User Manual] -- We also provide complete OpenVz Distro based on Ubuntu Server distribution.&lt;br /&gt;
&lt;br /&gt;
== Frozen projects ==&lt;br /&gt;
* EasyVZ: [http://easyvz.sourceforge.net/ screenshots] | [http://sourceforge.net/projects/easyvz sf.net project page] (little bit outdated, but working and free.  Last update Feb 2007) (requires Unix/Linux)&lt;br /&gt;
* Mwamko: [http://mwamko.org/ homepage] Last activity May 2007&lt;br /&gt;
* RoboVZ: [http://sharesource.org/project/robovz homepage] {{forum|2559}} Lots of promises since announced in May 2007, nothing usable yet.  Possibly GPL license.  No activity in 2 years, calling it frozen.&lt;br /&gt;
* vpsAdmin (www.vpsadmin.org) - GPLv3 license, PHP+MySQL+Bash, Multi-server &amp;amp; Multilingual support, vpsAdmin 1.0 released on January 19, 2010&lt;br /&gt;
* VZ-Manager: [http://vzmanager.de/ homepage (German)] website shows apache default page (11. 02. 2010)&lt;br /&gt;
* WebVZ: [http://webvz.sourceforge.net/ homepage] Version 2.0 released September 7, 2008 (Moved to [https://github.com/shuaibzahda/webvz/commits/master GitHub], last commit 2009-03-20). Requires Ruby on Rails.&lt;br /&gt;
* Webmin: [http://www.webmin.com/ homepage] | [http://www.webmin.com/cgi-bin/search_third.cgi?search=OpenVZ OpenVZ plugin] | Version 1.0, last updated 2006-02-07&lt;br /&gt;
* Panenthe: [http://www.panenthe.com/ homepage (English)] • [http://www.panenthe.com/products/panenthe-media/cat_id=4/ Screen shots] &amp;lt;- does not exist anymore since 2010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In development ==&lt;br /&gt;
* easyVZ! [http://www.easyVZ.org/ homepage] &lt;br /&gt;
* DTC-Xen [http://www.gplhost.com/software-dtc-xen.html homepage] - Currently being ported to OpenVZ by its main developers.&lt;/div&gt;</summary>
		<author><name>Kotakomputer</name></author>
		
	</entry>
</feed>