Updated vdsm packages that fix several bugs and add various enhancements are nowavailable.

VDSM is a management module that serves as a Red Hat Enterprise VirtualizationManager agent on Red Hat Enterprise Virtualization Hypervisor or Red HatEnterprise Linux hosts.This update fixes several bugs and adds multiple enhancements. Documentation forthese changes is available in the Technical Notes book: https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Virtualization/3.5/html-single/Technical_Notes/index.html
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Virtualization 3

SRPMS:
vdsm-4.16.8.1-5.el6ev.src.rpm
    MD5: 021fabb031a26191418e7e3343e56462SHA-256: 524a4bc4c7a4047b2ff84f38fe4056b4e5e7f57a17708526e6e105aedc3a8590
vdsm-4.16.8.1-5.el7ev.src.rpm
    MD5: 566d9111bf851a9004f929d17d585f2bSHA-256: 87d6a28b9e662da8884b0ee0d3ae770334e9f37bfe2f53f3dca55964f36de73c
 
x86_64:
vdsm-4.16.8.1-5.el6ev.x86_64.rpm
    MD5: a6dd4f626da65282c35cc7bfd3207a7bSHA-256: 1868b5119a494d9cde1e6321d3a6e4174229577dd90b7f9bc73a60e8047d43ef
vdsm-4.16.8.1-5.el7ev.x86_64.rpm
    MD5: 72c1467cd3a7edb402251dc867b31adaSHA-256: 0b379ca28265f52bd6cfac2c71ac9a14d8d1f3c4f0192ff165eb924f2c7e9259
vdsm-bootstrap-4.16.8.1-5.el6ev.noarch.rpm
    MD5: e7bc24282fdcccc66d7589a2608a30b1SHA-256: dd956880aca8e8a455acf01c0a4899558c86eec45f55d7ac8ca2d9d649e1a795
vdsm-bootstrap-4.16.8.1-5.el7ev.noarch.rpm
    MD5: 766db6ba1a5d453005e238e59986565aSHA-256: e7dd206b9af323ea0f3e1046cf47e414ecfe6e24c498860928f86b84844a7756
vdsm-cli-4.16.8.1-5.el6ev.noarch.rpm
    MD5: 9317a7367b60204cd3f25963e7232c2bSHA-256: 80ca0dbb73cc9bb59dceb6670d2cae5e795cbf5c11e5f62abf38fea7cc211c38
vdsm-cli-4.16.8.1-5.el7ev.noarch.rpm
    MD5: 56829b91d082aabbbfc05e122cf5c1e0SHA-256: 6c92c0bc22862111da7165093330cb02d4e47dcc65427a2a2bbaed917bc08a02
vdsm-debuginfo-4.16.8.1-5.el6ev.x86_64.rpm
    MD5: 77280af4132380335a150544c440feb4SHA-256: ec6b96ca01c902add9f935bacf65921c5a70621e13f95d15bbc61e0b710d3c23
vdsm-hook-ethtool-options-4.16.8.1-5.el6ev.noarch.rpm
    MD5: 2230cfb0d187f69ef59efc6e36c6c2aeSHA-256: 9078acc596266453891ea5f5fcced9e9cb7809f10eb2b60955b04860c031c2be
vdsm-hook-ethtool-options-4.16.8.1-5.el7ev.noarch.rpm
    MD5: 3474e3775bbc602ec70a9dde6a8b09a3SHA-256: f1d4b9d496c00872308349b4c34d748c6f45ffeaa187ad3f8d5f8b99846903c0
vdsm-hook-macspoof-4.16.8.1-5.el6ev.noarch.rpm
    MD5: 6811691bfd794b63db6612d0c4005bacSHA-256: 7f79ba1ad009c914a89e8992bb8e6e64de22a3c603776e649a141dd424f30643
vdsm-hook-macspoof-4.16.8.1-5.el7ev.noarch.rpm
    MD5: fc8b9254ec0149f4a8d60137d628d935SHA-256: 3a15e548f4c786e2461a4a84ff43c3bbfaeb2ec620b57be440a1755f9accf283
vdsm-hook-openstacknet-4.16.8.1-5.el6ev.noarch.rpm
    MD5: e4ee0e1c22f9b6bbced9aa80d73faf21SHA-256: 17c9a6e01324c4c4c97ae143ca19502cd1067c362765844744f4fff0d986ce45
vdsm-hook-openstacknet-4.16.8.1-5.el7ev.noarch.rpm
    MD5: adc17f2f3eb0f0e22c6e16117bb90bc7SHA-256: 5bee094aa706cdca4166054b61aac8bc2414e8063989cef7bc4dfbce3f5ba111
vdsm-hook-vhostmd-4.16.8.1-5.el6ev.noarch.rpm
    MD5: 615772a4a90cafb8ce0fc827ccf03c20SHA-256: 8f3a9841da5b1a14a84f837c01b549fc4c9f8fd8576704035081153d200e73cc
vdsm-hook-vhostmd-4.16.8.1-5.el7ev.noarch.rpm
    MD5: 3df582a7c3577264d758d68c7e41fd9dSHA-256: c11138901b9050cb9a8c89298ab14aaf5d5e43e95a7fbd6215d465fae814f58b
vdsm-jsonrpc-4.16.8.1-5.el6ev.noarch.rpm
    MD5: 8f16310230795f8a8bec7c059566ba7aSHA-256: f95068260f657e18e86c436e6d1c59c52f2b1747acc0d0887abd3bf32190ab02
vdsm-jsonrpc-4.16.8.1-5.el7ev.noarch.rpm
    MD5: 2ed056d5a77c132c29f6df78fa90adebSHA-256: c1e678ce38e771f8462f2caebe5e0f74b5dfeca38ff40443a4896a8e0bf23f11
vdsm-python-4.16.8.1-5.el6ev.noarch.rpm
    MD5: c79bbbc42bf3f4bebdd35e9bc9594f25SHA-256: 455b8e3c01391105ace4feb6bb178385fc5453db2e007ed24acc4c3f73d6258c
vdsm-python-4.16.8.1-5.el7ev.noarch.rpm
    MD5: 57fdc17d007c9327abd03a239b9601faSHA-256: 19349425054835c851297ab8eefe731de44d284151cc87c9124a641c238a1c36
vdsm-python-zombiereaper-4.16.8.1-5.el6ev.noarch.rpm
    MD5: 7041ffe1ae4ab256dd0411ea07433c20SHA-256: 0e3ad3417820f918e6d3a0bb24791bfad67898e00585872962898b79cc230065
vdsm-python-zombiereaper-4.16.8.1-5.el7ev.noarch.rpm
    MD5: 61ed015a8ca09d0e9ce5e3429aae16b0SHA-256: c0f440b56911c2ffdfe2331261e97ad3173840147ffca262caad51d2a787382f
vdsm-reg-4.16.8.1-5.el6ev.noarch.rpm
    MD5: 9ccc5b0d8462875581845c2ac862995cSHA-256: b0c81ce99bc4c18f87f62b99f17ae7df02d40dce7228c95d12768ff0f1c6c449
vdsm-reg-4.16.8.1-5.el7ev.noarch.rpm
    MD5: 0e16c850ceb48912eb40bf2c017ffe40SHA-256: db1ef8636e9a6fd4153a5562462c2e4ba0ecefff65f71389c21545c0aa821ee9
vdsm-xmlrpc-4.16.8.1-5.el6ev.noarch.rpm
    MD5: eb27404fb949dd8f2f3b827d85f00c5bSHA-256: 97e82c86e057fb5c0cadffdfbb4f40865d53ee34a8356b6471466abeb4ca6749
vdsm-xmlrpc-4.16.8.1-5.el7ev.noarch.rpm
    MD5: 7015b0d75da9a57b7ac9915129d5bc5cSHA-256: 0832aaa36e8e6f337bbe685f681a6dec146ae67303e9d3b026d6ff60389e260f
vdsm-yajsonrpc-4.16.8.1-5.el6ev.noarch.rpm
    MD5: 09470042d9d7fa12edbe740acb315b79SHA-256: a55c625f221df75caf234a36b880cbaaea34ccf332426989c8c390a4ab77f474
vdsm-yajsonrpc-4.16.8.1-5.el7ev.noarch.rpm
    MD5: 649b8b656d314226db2605a038cf4adcSHA-256: 1993c97daca6721810359deb779f8793d10774f61fdac0ab568ad6b3003efcd6
 
(The unlinked packages above are only available from the Red Hat Network)
1053114 – [vdsm] [Scalability] When host is loaded with networks – addNetwork and getVdsCaps takes a lot of time to return.1057284 – Error while execution action: Cannot extend Storage Domain. Storage device is unreachable from ${hostname}1062617 – vdsm does not reflect speed of underlying interface for VLANs1072030 – High shared memory being reported on hypervisor1073989 – “data has no embedded checksum” warning when attaching new storage domain1083100 – vdsm depends on rsyslog1090109 – The start time for ‘migration_max_time_per_gib_mem’ appears to be calculated too early.1092166 – PRD35 – [RFE] Expose prepareImage and teardownImage commands in vdsClient1097674 – [setupNetworks]IP address for BOND is not updated on the host1098769 – [vdsm] Reconstruct master fails with ResourceTimeout on an EMC-VNX machine1100264 – [RHEVM] adding host with VLANed network using dhcp fails1101021 – VM channels listener crashes – RHEVM 3.4 UI doesn’t show VM installed applications1102549 – ERROR message was shown in vdsm.log on host when VM suspend by RHEVM1104733 – VDSM failure on migration destination causes stuck migration task1104774 – RHEV needs to support 4,000 GB of Memory1111234 – [RFE] Host Self-Health Log: network connectivity information1111935 – vdsm fails to configure libvirt module when yum updating from 4.10 version to 4.141113185 – PRD35 – [RFE] NFS custom mountoptions1113948 – Vdsm sampling threads unexpectingly stops with IOError ENODEV1114258 – PRD35 – [RFE] vdsm-tool: replace libvirt-configure.sh with python code1121295 – Odd vCPU topology dropped by libvirt1121998 – RHEV-H 20140603.2 – new FC LUNs not visible1125237 – Use libvirt default logging parameters to reduce cost of starting multiple VMs1136982 – vdsClient is not showing the correct information of the VM1139707 – qcow2 images created on rhel7 hosts are unreadable on rhel6 hosts1144639 – vdsm-reg: interfaces removed only lo remains1148688 – ssl_accept might block after reboot1152587 – vdsm-4.14.13-2 sends FC LIP events on storage actions1159839 – New FC LUNs are not detected on hypervisor without a reboot1162784 – remove vdsm pki private key leak from rhev log collection1173257 – RHEV VM with hugepages panics after migration due to memory balloon device755528 – VDSM: vm with cd as first device when iso domain is blocked from host, will remain in ‘wait for launch’ with no pid until backend will change domain state to inactive821493 – [RFE] Multiple queue NICs Feature – RHEV support

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply