An update is now available for Red Hat Virtualization Manager version 4.0.
The Red Hat Virtualization Manager is a centralized management platformthat allows system administrators to view and manage virtual machines.

TheManager provides a comprehensive range of features including searchcapabilities, resource management, live migrations, and virtualinfrastructure provisioning.The Manager is a JBoss Application Server application that provides severalinterfaces through which the virtual environment can be accessed andinteracted with, including an Administration Portal, a User Portal, and aRepresentational State Transfer (REST) Application Programming Interface(API).Changes to the ovirt-engine component:* This update fixes an issue where V2V fails for a VMware external providerwhich contains special characters in a data center, cluster, or folder name.

Thecharacters are now encoded on the V2V engine side before sending them to theVDSM.1) This solution encodes the VMware data center and VMware cluster parts of theuri.

For example, in the URIvpx://user@vcenter/<DATACENTER>/<CLUSTER>/esxi?no_verify=1 the <DATACENTER> and<CLUSTER> parts are encoded, including folders if they exist. Other parts of theURI are left decoded.2) The UI will display the data center and cluster as was originally typed bythe user.3.

The encoding is done on the frontend and should be also done while using RESTAPIs for VMware V2V. (BZ#1377271)* The latest virtio-win release which includes Windows 10 drivers is nowrequired by Red Hat Virtualization Manager to ensure it will be upgraded.(BZ#1379559)* Updated messages written to the audit log. Previously backup execution startand finish events were identified only with “Started”/”Finished” values, so itwas not obvious which process has started or finished.

Events now have theformat “Backup started at …” and “Backup finished at …”. (BZ#1381562)
Red Hat Virtualization ( v.4 for RHEL 7)

SRPMS:
ovirt-engine-4.0.5.5-0.1.el7ev.src.rpm
    MD5: a99f4ccfda34a2d9041d2ff7204b547dSHA-256: 5d2c8f16ef546e0eacbcce729e305335057131dc7c5c91c233860ce9f23c1a8a
 
x86_64:
ovirt-engine-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: 8c750516112ee76da4da9cfa779c345bSHA-256: 1cf9fb4b34c9d898a2b2d3277faee99b37f258f630ebfe9ba1b3e812ff7ab3e8
ovirt-engine-backend-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: b4bc1d70243ab75ddf05ca80f643b14eSHA-256: 2f213b585ff151714902639e880d74262e69ab576aeaa87567c9dfbd4cf862b3
ovirt-engine-dbscripts-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: 0e312ec95ed590a1151437f0deb30404SHA-256: edfe840c3869c6342797334a71168bfeea310d2171d67c6a2180c2d7394ce3e4
ovirt-engine-extensions-api-impl-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: a781d3338d916d9429b5172fce346597SHA-256: 67f548b807d374145e5acb2939bdb05736b0ed0bbf418a20416bba883fb2c330
ovirt-engine-extensions-api-impl-javadoc-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: 4185569badf11464ad0af311f0b0e129SHA-256: 4f4580006f9a6f7b0ac27c37a09ceadb87ddb44b7b8d3c2cf4e97ed2ba737197
ovirt-engine-lib-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: b74f5771fd4752047ea0ce5c58a5f7b9SHA-256: 8974af4bc64d3ce6e00810fcbe622f9dae35d11bfd1c06e27d07589ccd40bfcb
ovirt-engine-restapi-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: b86be27770921d71f3fe64d81e66229bSHA-256: 8ed912c0e12282a8e0d76619208e5610c5e49660b048f4cf56299c54c726366d
ovirt-engine-setup-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: 0312ea9ac058916fea0aa93cc1e4b570SHA-256: 472e2a8195c13397f49abf511a1fd9a47ddec0c33618505cd22c50a20fff3a4c
ovirt-engine-setup-base-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: 5f1dfed5bd96ed44033cd914b95d33a8SHA-256: bdfd398d708ddc5b984e1d2f5c5dec6d56d7562505abd23af676291271f40fb7
ovirt-engine-setup-plugin-ovirt-engine-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: 7b064c67fe83630f56672e50015c0b49SHA-256: ab6138b9646149a05a0a13aaef9c2a50df3d653ad8b0246d72be61d22084163c
ovirt-engine-setup-plugin-ovirt-engine-common-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: 1b52332a940c8911b7a50e81229365bcSHA-256: 4f8ef21e8b855dfda0e02dff3f52ef84bdb3e3d9644db22812779a169d5c398e
ovirt-engine-setup-plugin-vmconsole-proxy-helper-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: 4e7ac5de98c49da7e6b9035bbbe4c745SHA-256: 4ed2c303677ed5ea8ff40e216dd9c1890ac4d6040f051d4311bd5e6891952468
ovirt-engine-setup-plugin-websocket-proxy-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: 186e6b23e7c242b464c814af56fa1a38SHA-256: a79aafb81eb3505ceb9929e9697d65490a55c9ccd1275b1bb3d6fc4acae7e8f2
ovirt-engine-tools-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: 2a769378cb151d07375e42c4b5673f91SHA-256: 6c0315e872113a3fba469ca758ffaeb903a0efefc25b3614883225710d905ee4
ovirt-engine-tools-backup-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: 1e942f7fdd0562212574a951e64e117dSHA-256: 7840325533912d1da56f626ada1780f9b0cf14f9d99fe9f5cbca3f4246863e8f
ovirt-engine-userportal-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: ec1c6e4f499f82cb71e1cdd105071893SHA-256: eeb7c98dd16a67e74264015a53482bc3e565f898181f68b00e66dc7a8e0c3e47
ovirt-engine-vmconsole-proxy-helper-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: 3064a61f6012488f387e005a8bbe8482SHA-256: 9063076941f2a0d51e291447c2137f3bba3c9df6e92431c06ed9fd1fb895d643
ovirt-engine-webadmin-portal-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: 049da6e8a7952678646fe3aa168857e6SHA-256: 527250dcdad933f5a86dffc33bd22ab1d96e7a2d7a8826b6a89ceae2e1391120
ovirt-engine-websocket-proxy-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: 3ccf0bd1c1021fa4f4ad782d917f7bbcSHA-256: f7764c2e5af1a271d35942e8127ee91c8a6f423c238439e4267b4b66c33a2b90
rhevm-4.0.5.5-0.1.el7ev.noarch.rpm
    MD5: aeca8bedd4b6e673c5f95d87278202f1SHA-256: 5ad8d79affe3d2ee58f0f59e6c4a13af09210a3d279544920ac9075a128b539e
 
(The unlinked packages above are only available from the Red Hat Network)

1377271 – [z-stream clone – 4.0.5] Special characters in VMware cluster and data center name should be handled correctly1379121 – [z-stream clone – 4.0.5] Clusters with no display network after upgrade1379559 – [z-stream clone – 4.0.5] rhevm should require a virtio-win version that provides win10 drivers within vfd1379730 – [RFE][Tracker][TestOnly] – Certify Neutron OSP 9 via external network provider.1381562 – [z-stream clone – 4.0.5] “Started – Finished” Messages in the audit log without any information

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply