Overview
Action plan policies control whether migration plans require human approval before execution or execute automatically after audit completion. The default policy requires explicit approval — ensuring operators review every migration before it occurs. Automatic execution is available for trusted, validated strategies in controlled environments.Policy Options
Manual Approval (Default)
All action plans require an explicit
execute call. Operators review each
migration before approving. No workloads move without human oversight.Automatic Execution
Plans execute immediately after audit completion without operator review.
Suitable for fully tested strategies in non-production environments.
Manual Approval Policy
The default policy. All action plans are created inRECOMMENDED state and require
explicit execution via the Dashboard or CLI.
This policy is appropriate for:
- Production environments with change management requirements
- Strategies involving mission-critical instances
- Clusters where maintenance windows must be respected
Automatic Execution Policy
Enable automatic execution by settingauto_trigger at audit creation:
Create auto-executing audit
--auto-trigger True in the audit creation command. All
resulting action plans execute automatically within 5–10 minutes of audit completion.
Action Plan Expiry
Plans become stale when the cluster state changes significantly after audit completion. Configure a maximum plan age to prevent outdated migrations from executing.- XDeploy
- CLI
Open Advanced Configuration
Open XDeploy and navigate to Advanced Configuration. In the Service Tree
(left panel), select watcher.
Edit the Expiry Setting
Click New File or select an existing Plans older than
watcher.conf from the File Browser
(right panel). Add the following in the Code Editor (center panel):/etc/xavs/config/watcher/watcher.conf
action_plan_expiry hours are automatically set to CANCELLED state.
A new audit must run to generate a current plan.Role-Based Execution Control
By default, theadmin role can create audits, approve plans, and execute them.
The member role has read-only access to audits and plans.
To restrict execution to cloud administrators only, verify the default policy:
Check RBAC policy
- Plan execution requires the
adminrole - Plan viewing is available to
memberandreaderroles - Plan creation (via audit) requires the
adminrole
Validation
- Dashboard
- CLI
Create a test audit and verify the resulting action plan shows
RECOMMENDED
state (not auto-executed) when manual approval is configured.Action plan requires explicit approval before execution can begin.
Next Steps
Scheduling
Set up recurring audits and configure their execution policy.
Security
Configure RBAC to restrict execution to the admin role.
Compute Integration
Ensure compute hosts support live migration for action execution.
Troubleshooting
Diagnose auto-trigger failures and execution policy issues.