Updated OpenStack Compute packages that resolve various issues are nowavailable for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) forRHEL 7.
Red Hat Enterprise Linux OpenStack Platform provides the facilities forbuilding a private or public infrastructure-as-a-service (IaaS) cloudrunning on commonly available physical hardware.

This advisory includespackages for:* OpenStack Compute serviceOpenStack Compute (nova) launches and schedules large networks of virtualmachines, creating a redundant and scalable cloud computing platform.Compute provides the software, control panels, and APIs required toorchestrate a cloud, including running virtual machine instances andcontrolling access through users and projects.Changes to the openstack-nova component:* Previously, a race condition would be encountered when instances were assignedseveral network interfaces, causing some interfaces to not be correctlyinitialized during boot time, or removed during the build process. With thisupdate, a lock has now been added to the method that maintains the networkinterfaces for instances, resolving the race condition so that you can correctlyboot instances with multiple network interfaces or rebuild instances withoutlosing any network interfaces. (BZ#1279505)* Previously, the code responsible for initializing live migration of instancesdid not handle some exceptions that could be raised.
If an unexpected exceptionwas raised, the code could not handle it, and the instance would enter anunpredictable state. With this update, the code has been improved to handleunexpected exceptions and convert them to a knowing MigrationError’s exception,which allows instances that experience unexpected exceptions to enter an errorstate, which is expected.

The code now also rolls back any actions. (BZ#1292503)
Before applying this update, ensure all previously released errata relevantto your system have been applied.Red Hat Enterprise Linux OpenStack Platform 6 runs on Red Hat EnterpriseLinux 7.2.The Red Hat Enterprise Linux OpenStack Platform 6 Release Notes contain thefollowing:* An explanation of the way in which the provided components interact toform a working cloud computing environment.* Technology Previews, Recommended Practices, and Known Issues.* The channels required for Red Hat Enterprise Linux OpenStack Platform 6,including which channels need to be enabled and disabled.The Release Notes are available at:https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/6/html/Release_Notes/index.htmlThis update is available through the Red Hat Network.

Details on how to usethe Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat OpenStack 6.0 for RHEL 7

SRPMS:
openstack-nova-2014.2.3-54.el7ost.src.rpm
    MD5: dfa502334a7d1da7171fd0604b15bbd4SHA-256: bd15ea667e9b93b29d99d3bc1de998263c967c20929049ff6c7ee11f6d3dd395
 
x86_64:
openstack-nova-2014.2.3-54.el7ost.noarch.rpm
    MD5: 2313236b8860dd03a89e1e6b8800b249SHA-256: 0a56308e968482452cc7abb8e68cc716bbc8fb81d137f17af98328aeb5493aba
openstack-nova-api-2014.2.3-54.el7ost.noarch.rpm
    MD5: 0c3b78a32bd204aa1596ec887a601b52SHA-256: 5d4d710c0591c832468cdf423771ee3a2971754dbae1781ac5115aa424a939e3
openstack-nova-cells-2014.2.3-54.el7ost.noarch.rpm
    MD5: 14096458eb42a848548fbc24addd941cSHA-256: 01fda92e8f605db77d158e797f0a32e88232f150c3acb4f8db7447f8c37c9bb2
openstack-nova-cert-2014.2.3-54.el7ost.noarch.rpm
    MD5: 07f94d91be0e3e3d9f924ca65acddbb9SHA-256: 242682cfa0cca7ab0b7e5c58de8b41fe56c3b98503089b7ad2b3ebdfb52549fc
openstack-nova-common-2014.2.3-54.el7ost.noarch.rpm
    MD5: b3573d3854b6716377b26a205cc1767bSHA-256: c1b1c8cddf4def8deddd438d9d7f687ed88983be3886b4917be00bb93d24974e
openstack-nova-compute-2014.2.3-54.el7ost.noarch.rpm
    MD5: 23ff423b907586d612eb7410096299f9SHA-256: c4253042eab4890d2e33a0d777c07883b9b7c95ae58ef5bd725772bbc7300a78
openstack-nova-conductor-2014.2.3-54.el7ost.noarch.rpm
    MD5: f89d2ab12904631bf998ce2a5941e442SHA-256: 5763eaac6034f7e4a167fa4c64733e3a8166f397f15b858061e17ed197e7c885
openstack-nova-console-2014.2.3-54.el7ost.noarch.rpm
    MD5: 7a3b96564e798ecbb37d1bbb2ffbe290SHA-256: 346b09930a5226f08f9dd73371b589ed726b3da520bea4be5792c4b263572580
openstack-nova-doc-2014.2.3-54.el7ost.noarch.rpm
    MD5: fe581da6e7eca6c02f63daca84f5695bSHA-256: a121ec2527e1a329913da6949c68a3f8ac4500087e078861af49b04b12cc99ee
openstack-nova-network-2014.2.3-54.el7ost.noarch.rpm
    MD5: 1825820bb1f0e3c349c7246a2b8110b7SHA-256: 823d9836c56526b0b163b6db05e771763e03fa007f4049abe661faaeb36a8cde
openstack-nova-novncproxy-2014.2.3-54.el7ost.noarch.rpm
    MD5: 8a49866091f306b8bb8bc87e7dcaf21dSHA-256: 0dbc969b396d79f6446aec3d34894b78e3eaaa63fa3cff42ce07a108aa369242
openstack-nova-objectstore-2014.2.3-54.el7ost.noarch.rpm
    MD5: 15cfe5ef99f0a46102412fb94c4dbf47SHA-256: 9c27ca441186635b7517376dd7c000b1343635336ccf67add42a569f5618ee24
openstack-nova-scheduler-2014.2.3-54.el7ost.noarch.rpm
    MD5: 002b471a32b4723629d44e8a743532b2SHA-256: b7b23cd596e70ef4137a202af92cf4e96ce4785daa4e2c2584efa760eeffb2aa
openstack-nova-serialproxy-2014.2.3-54.el7ost.noarch.rpm
    MD5: 382d156bc5f0d214821777ab397806a9SHA-256: 8d7f4a3cd60e18db5f1840d1a5edb90b6b29a952db54e478178bf2b17755d715
python-nova-2014.2.3-54.el7ost.noarch.rpm
    MD5: b2ee8e734d50de280d8e3447577601c0SHA-256: 44bc90582cdf6ced956e23c564c70c24459e5432a07ed40ba3690744ea0226e3
 
(The unlinked packages above are only available from the Red Hat Network)

1254075 – Attaching volume to iso instance is failure because of duplicate device name ‘hda’.1273472 – LibvirtFibreChannelVolumeDriver might miss multipath ids during detection if system is under load1279505 – Instance rebuild removes some interfaces & also changes interface mac address of the rest1292503 – instance stuck at migrating state when some unexpected error happened1296049 – Support ssh-keygen of OpenSSH 6.81296409 – Unexpected multipath deletion.1302812 – backport the metadata_cache_expiration config option to avoid hardcoded value of 15s

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: