[pve-devel] About PVE Backup Integration Guide

Prashant Patil Prashant.Gamepatil at veritas.com
Tue Apr 1 09:02:04 CEST 2025


Finally, we can install packages from pvtest repository.



We have gone through plugins POD material; we have few questions from very little understanding about plugins:

  1.  Storage plugin
     *   What is the main purpose of storage plugin?
     *   Do we need to implement our own storage plugin? Which all functions we need to implement?



  1.  Backup Provider plugin
     *   What is the main purpose of backup provider plugin?
     *   Do we need to implement our own backup provider plugin? Which all functions we need to implement?
     *   Which model this provider refers to - push model or pull model?
     *   It looks like we have two main callback functions - job_hook() and backup_hook(). Who calls these functions and when do they get called?
     *   backup_get_mechanism() - This function needs to be called by external backup product?
     *   backup_vm() - This function needs to be called by external backup product? Does it support all disk formats and backed storages?



Regards

Prashant



-----Original Message-----
From: Fiona Ebner <f.ebner at proxmox.com>
Sent: 28 March 2025 03:39 PM
To: Prashant Patil <Prashant.Gamepatil at veritas.com>; Proxmox VE development discussion <pve-devel at lists.proxmox.com>; Thomas Lamprecht <t.lamprecht at proxmox.com>
Cc: Anuradha Joshi <Anuradha.Joshi at veritas.com>; Sudhir Subbarao <Sudhir.Subbarao at veritas.com>; Jason Voneberstein <Jason.vonEberstein at veritas.com>
Subject: Re: [pve-devel] About PVE Backup Integration Guide





CAUTION: This email originated from outside the organization. Do not click links or open attachments unless you recognize the sender and know the content is safe. If you believe this is a phishing email, use the Report to Cybersecurity icon in Outlook.







Am 28.03.25 um 10:31 schrieb Prashant Patil:

> Made changes as mentioned in earlier email to use pvetest repo. With

> those changes, 'apt-get update' used to fail, had to disable

> enterprise repositories as per the screenshot below. Wit this, I was

> able to run 'apt-get update', but 'apt-get dist-upgrade' failed with

> below mentioned errors.  Am I missing something?



Yes, you cannot use the enterprise repository without a valid subscription. But you don't need it, because for testing you only need the newer package versions from the pvetest repository.



>

> root at rs-proxmox2:/home/ppatil/patch# apt-get update

>

> Hit:1

> https://nam12.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsecur<http://secur/>

> ity.debian.org%2F&data=05%7C02%7CPrashant.Gamepatil%40veritas.com%7C22

> eef66b30184f68a35908dd6de07f32%7Cfc8e13c0422c4c55b3eaca318e6cac32%7C0%

> 7C0%7C638787533180521868%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRyd

> WUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3

> D%7C0%7C%7C%7C&sdata=vb1NBcqDiAbi27Nx3cqzeDKxORPDWcjIbyRPAJD7%2F%2Fo%3

> D&reserved=0

> <https://nam12.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsecu

> rity.debian.org%2F&data=05%7C02%7CPrashant.Gamepatil%40veritas.com%7C2

> 2eef66b30184f68a35908dd6de07f32%7Cfc8e13c0422c4c55b3eaca318e6cac32%7C0

> %7C0%7C638787533180543007%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRy

> dWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%

> 3D%7C0%7C%7C%7C&sdata=sCDQdb8XGvfU9OAOFG1%2Fc5014xIO%2BLiugHGEq4wwxK0%

> 3D&reserved=0> bookworm- security InRelease

>

> Hit:2

> https://nam12.safelinks.protection.outlook.com/?url=http%3A%2F%2Fftp.d<http://ftp.d/>

> ebian.org%2Fdebian&data=05%7C02%7CPrashant.Gamepatil%40veritas.com%7C2

> 2eef66b30184f68a35908dd6de07f32%7Cfc8e13c0422c4c55b3eaca318e6cac32%7C0

> %7C0%7C638787533180557220%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRy

> dWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%

> 3D%7C0%7C%7C%7C&sdata=7xnYO0xJvi5G3o94gbL58Vaz6flZHGGtyHhOitEpZ%2BM%3D

> &reserved=0

> <https://nam12.safelinks.protection.outlook.com/?url=http%3A%2F%2Fftp.

> debian.org%2Fdebian&data=05%7C02%7CPrashant.Gamepatil%40veritas.com%7C

> 22eef66b30184f68a35908dd6de07f32%7Cfc8e13c0422c4c55b3eaca318e6cac32%7C

> 0%7C0%7C638787533180570399%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnR

> ydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D

> %3D%7C0%7C%7C%7C&sdata=bByGA2Ze6EbZsdLiWYahc9AHpdHyW%2BIDpbstAa787ds%3

> D&reserved=0>

> bookworm InRelease

>

> Hit:3

> https://nam12.safelinks.protection.outlook.com/?url=http%3A%2F%2Fftp.d<http://ftp.d/>

> ebian.org%2Fdebian&data=05%7C02%7CPrashant.Gamepatil%40veritas.com%7C2

> 2eef66b30184f68a35908dd6de07f32%7Cfc8e13c0422c4c55b3eaca318e6cac32%7C0

> %7C0%7C638787533180583014%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRy

> dWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%

> 3D%7C0%7C%7C%7C&sdata=jATUPh0YUYbM55T6Sw72furRWfveOEBv3QRBEFY3E3g%3D&r

> eserved=0

> <https://nam12.safelinks.protection.outlook.com/?url=http%3A%2F%2Fftp.

> debian.org%2Fdebian&data=05%7C02%7CPrashant.Gamepatil%40veritas.com%7C

> 22eef66b30184f68a35908dd6de07f32%7Cfc8e13c0422c4c55b3eaca318e6cac32%7C

> 0%7C0%7C638787533180596413%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnR

> ydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D

> %3D%7C0%7C%7C%7C&sdata=cXzlasxJlKn7Gyh0hKb30B2h2XoAXwIFMa%2F0ys%2BdQ6Y

> %3D&reserved=0>

> bookworm-updates InRelease

>

> Hit:4

> https://nam12.safelinks.protection.outlook.com/?url=http%3A%2F%2Fdownl<http://downl/>

> oad.proxmox.com%2Fdebian%2Fpve&data=05%7C02%7CPrashant.Gamepatil%40ver

> itas.com%7C22eef66b30184f68a35908dd6de07f32%7Cfc8e13c0422c4c55b3eaca31

> 8e6cac32%7C0%7C0%7C638787533180608575%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0

> eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIl

> dUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=Uep04glbhsK5pPQ%2FmHGpZMn5blwu9%2BYM

> ntwPGIxfyW4%3D&reserved=0 <http:// download.proxmox.com/debian/pve>

> bookworm InRelease

>

> Reading package lists... Done

>

> root at rs-proxmox2:/home/ppatil/patch# apt-get dist-upgrade

>

> Reading package lists... Done

>

> Building dependency tree... Done

>

> Reading state information... Done

>

> You might want to run 'apt --fix-broken install' to correct these.

>

> The following packages have unmet dependencies:

>

> pve-manager : Depends: proxmox-widget-toolkit (>= 4.3.5) but 4.3.1 is

> installed

>

>                Recommends: pve-nvidia-vgpu-helper but it is not

> installed

>

> E: Unmet dependencies. Try 'apt --fix-broken install' with no packages

> (or specify a solution).



What if you run "apt --fix-broken install"? If that doesn't help, please share the output of "apt policy proxmox-widget-toolkit".



Best Regards,

Fiona




This message was sent by an employee of Arctera.


More information about the pve-devel mailing list