Skip to navigation

Bug Fix Advisory virt-who bug fix and enhancement update

Advisory: RHBA-2013:0374-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-02-20
Last updated on: 2013-02-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated virt-who packages that fix several bugs and add various enhancements are
now available for Red Hat Enterprise Linux 6.

The virt-who packages provide an agent that collects information about virtual
guests present in the system and reports them to the Red Hat Subscription
Manager tool.

This update fixes the following bugs:

* Previously, when running the virt-who service, unregistering a Red Hat
Enterprise Virtualization Hypervisor host from the Subscription Asset Manager
(SAM) server caused the service to be terminated with the following message:

SubscriptionManagerError: No such file or directory
Error in communication with candlepin, trying to recover
Unable to read certificate, system is not registered or you are not root

Only the last line of the aforementioned message should have been displayed.
This bug has been fixed, and the traceback errors are now saved to the log file
and not printed on the screen. (BZ#825215)

* When a snapshot of a virtual machine (VM) was created in Microsoft Hyper-V
Server, the virt-who agent replaced the UUID of the VM file with the UUID of the
snapshot. This bug has been fixed, and the UUID is not changed in the described
case. Additionally, in certain cases, the virt-who agent running with the
"--hyperv" command-line option terminated with the following message:

AttributeError: HyperV instance has no attribute 'ping'

This bug has been fixed and the aforementioned error no longer occurs.
(BZ#866890)

* Previously, the virt-who agent failed to function correctly when a URL, which
was set in the VIRTWHO_ESX_SERVER parameter, was missing the initial "https://"
string. With this update, virt-who has been modified, and "https://" is no
longer required in VIRTWHO_ESX_SERVER. (BZ#869960)

This update also adds the following enhancements:

* With this update, the virt-who agent has been modified to start as a
foreground process and to print error messages or debugging output (the "-d"
command-line option) to the standard error output. Moreover, the following
command-line options have been enhanced: the "-o" option provides the one-shot
mode and exits after sending the list of guests; the "-b" option and the
"service virt-who start" command equivalently start on the background and send
data to the /var/log/ directory. (BZ#808060)

* The virt-who agent has been modified to support Red Hat Enterprise
Virtualization Manager polling. (BZ#846788)

* With this update, the virt-who agent has been modified to correctly recognize
guest virtual machines, which are installed on top of Microsoft Hyper-V Server.
(BZ#860854)

* The virt-who manual pages and the output of the "virt-who --help" command have
been enhanced with clarifying information. In addition, a typographical error
has been corrected in both texts. (BZ#868149)

All users of virt-who are advised to upgrade to these updated packages, which
fix these bugs and add these enhancements.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

IA-32:
virt-who-0.8-5.el6.noarch.rpm
File outdated by:  RHEA-2013:1715
    MD5: 5c329fc9df7b2b5cbbca55e37ff0fcbc
SHA-256: 72d2d82f950e325dc9ec2d64e9bd65777a12e3673976be91c0eafab4f402c8f6
 
x86_64:
virt-who-0.8-5.el6.noarch.rpm
File outdated by:  RHEA-2013:1715
    MD5: 5c329fc9df7b2b5cbbca55e37ff0fcbc
SHA-256: 72d2d82f950e325dc9ec2d64e9bd65777a12e3673976be91c0eafab4f402c8f6
 
Red Hat Enterprise Linux HPC Node (v. 6)

x86_64:
virt-who-0.8-5.el6.noarch.rpm
File outdated by:  RHEA-2013:1715
    MD5: 5c329fc9df7b2b5cbbca55e37ff0fcbc
SHA-256: 72d2d82f950e325dc9ec2d64e9bd65777a12e3673976be91c0eafab4f402c8f6
 
Red Hat Enterprise Linux Server (v. 6)

IA-32:
virt-who-0.8-5.el6.noarch.rpm
File outdated by:  RHEA-2013:1715
    MD5: 5c329fc9df7b2b5cbbca55e37ff0fcbc
SHA-256: 72d2d82f950e325dc9ec2d64e9bd65777a12e3673976be91c0eafab4f402c8f6
 
PPC:
virt-who-0.8-5.el6.noarch.rpm
File outdated by:  RHEA-2013:1715
    MD5: 5c329fc9df7b2b5cbbca55e37ff0fcbc
SHA-256: 72d2d82f950e325dc9ec2d64e9bd65777a12e3673976be91c0eafab4f402c8f6
 
s390x:
virt-who-0.8-5.el6.noarch.rpm
File outdated by:  RHEA-2013:1715
    MD5: 5c329fc9df7b2b5cbbca55e37ff0fcbc
SHA-256: 72d2d82f950e325dc9ec2d64e9bd65777a12e3673976be91c0eafab4f402c8f6
 
x86_64:
virt-who-0.8-5.el6.noarch.rpm
File outdated by:  RHEA-2013:1715
    MD5: 5c329fc9df7b2b5cbbca55e37ff0fcbc
SHA-256: 72d2d82f950e325dc9ec2d64e9bd65777a12e3673976be91c0eafab4f402c8f6
 
Red Hat Enterprise Linux Workstation (v. 6)

IA-32:
virt-who-0.8-5.el6.noarch.rpm
File outdated by:  RHEA-2013:1715
    MD5: 5c329fc9df7b2b5cbbca55e37ff0fcbc
SHA-256: 72d2d82f950e325dc9ec2d64e9bd65777a12e3673976be91c0eafab4f402c8f6
 
x86_64:
virt-who-0.8-5.el6.noarch.rpm
File outdated by:  RHEA-2013:1715
    MD5: 5c329fc9df7b2b5cbbca55e37ff0fcbc
SHA-256: 72d2d82f950e325dc9ec2d64e9bd65777a12e3673976be91c0eafab4f402c8f6
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

808060 - [RFE] virt-who command line option improvements
825215 - Subscription-manager unregister error : SubscriptionManagerError: No such file or directory(on rhevh)
846788 - [RFE] Support for virt-who polling against RHEVM directly
866890 - virt-who support Hyper-V problems
868149 - There are some suggestions in man config file and help info.
869960 - virt-who cannot work in ESX mode if setting the parameter VIRTWHO_ESX_SERVER without "https://"



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/