- Issued:
- 2017-05-03
- Updated:
- 2017-07-17
RHEA-2017:1195 - Product Enhancement Advisory
Synopsis
ovirt-hosted-engine-ha bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ovirt-hosted-engine-ha packages that fix a bug are now available.
Description
The ovirt-hosted-engine-ha package enables the self-hosted engine to be highly available. A self-hosted engine is a virtualized environment in which the Red Hat Virtualization Manager runs on a virtual machine on the hosts managed by the Manager. If the host running the virtual machine goes into maintenance, the virtual machine is migrated automatically to another host in the environment.
Changes to the ovirt-hosted-engine-ha component:
- Previously, the Red Hat Enterprise Virtualization 3.5 self-hosted engine storage domain upgrade failed on the initial host due to permissions errors. This has been corrected. (BZ#1401359)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/2974891
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
Fixes
- BZ - 1401359 - [Hosted-Engine] 3.5 HE SD upgrade fails if done on initial host
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 7
| SRPM | |
|---|---|
| ovirt-hosted-engine-ha-2.1.0.5-2.el7ev.src.rpm | SHA-256: bb23d0a2e5339701b339682a7e9396921e57964b377d17ae0f2a87b42c3eb2fa |
| x86_64 | |
| ovirt-hosted-engine-ha-2.1.0.5-2.el7ev.noarch.rpm | SHA-256: 3777ce6c4b7eea91941352f9b84b38173562461f62bc84eddd1321c7b65cd5c1 |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
| SRPM | |
|---|---|
| ovirt-hosted-engine-ha-2.1.0.5-2.el7ev.src.rpm | SHA-256: bb23d0a2e5339701b339682a7e9396921e57964b377d17ae0f2a87b42c3eb2fa |
| ppc64le | |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.