Upgrade Guide
Update and upgrade tasks for Red Hat Virtualization
Abstract
Red Hat Virtualization Upgrade Overview Copy linkLink copied to clipboard!
This guide explains how to upgrade the following environments to Red Hat Virtualization 4.3 or 4.4 :
- Self-hosted engine, local database: Both the Data Warehouse database and the Manager database are installed on the Manager.
- Standalone manager, local database: Both the Data Warehouse database and the Manager database are installed on the Manager.
- Standalone manager, remote database: Either the Data Warehouse database or the Manager database, or both, are on a separate machine.
For a checklist of upgrade instructions, you can use the RHV Upgrade Helper. This application asks you to fill in a checklist for your upgrade path and current environment, and presents the applicable upgrade steps.
Plan any necessary downtime in advance. After you update the clusters' compatibility versions during the upgrade, a new hardware configuration is automatically applied to each virtual machine once it reboots. You must reboot any running or suspended VMs as soon as possible to apply the configuration changes.
Select the appropriate instructions for your environment from the following table. If your Manager and host versions differ (if you have previously upgraded the Manager but not the hosts), follow the instructions that match the Manager’s version.
| Current Manager version | Target Manager version | Relevant section |
|---|---|---|
| 4.3 | 4.4 | Self-hosted engine, local database environment: Upgrading a self-Hosted engine from Red Hat Virtualization 4.3 to 4.4 Local database environment - Upgrading from Red Hat Virtualization 4.3 to 4.4 Remote database environment: Upgrading a Remote Database Environment from Red Hat Virtualization 4.3 to 4.4 |
| 4.2 | 4.3 | Self-hosted engine, local database environment: Upgrading a Self-Hosted Engine from Red Hat Virtualization 4.2 to 4.3 Local database environment: Upgrading from Red Hat Virtualization 4.2 to 4.3 Remote database environment: Upgrading a Remote Database Environment from Red Hat Virtualization 4.2 to 4.3 |
Chapter 1. Upgrading a self-hosted engine environment Copy linkLink copied to clipboard!
1.1. Upgrading a self-Hosted engine from Red Hat Virtualization 4.3 to 4.4 Copy linkLink copied to clipboard!
Upgrading a self-hosted engine environment from version 4.3 to 4.4 involves the following steps:
Upgrade Considerations
- When planning to upgrade, see Red Hat Virtualization 4.4 upgrade considerations and known issues.
When upgrading from Open Virtual Network (OVN) and Open vSwitch (OvS) 2.11 to OVN 2021 and OvS 2.15, the process is transparent to the user as long as the following conditions are met:
- The Manager is upgraded first.
- The ovirt-provider-ovn security groups must be disabled, before the host upgrade, for all OVN networks that are expected to work between hosts with OVN/OvS version 2.11.
- The hosts are upgraded to match OVN version 2021 or higher and OvS version 2.15. You must complete this step in the Administration Portal, so you can properly reconfigure OVN and refresh the certificates.
- The host is rebooted after an upgrade.
To verify whether the provider and OVN were configured successfully on the host, check the OVN configured flag on the General tab for the host. If the OVN Configured is set to No, click → . This setting is also available in the REST API. If refreshing the capabilities fails, you can configure OVN by reinstalling the host from Manager 4.4 or higher.
- Make sure you meet the prerequisites, including enabling the correct repositories
- Use the Log Collection Analysis tool and Image Discrepancies tool to check for issues that might prevent a successful upgrade
- Migrate any virtual machines that are running on the same host as the Manager virtual machine to another host in the same cluster
- Place the environment in global maintenance mode
- Update the 4.3 Manager to the latest version of 4.3
- Upgrade the Manager from 4.3 to 4.4
- Upgrade the self-hosted engine nodes, and any standard hosts, while reducing virtual machine downtime
- (Optional) Upgrade RHVH while preserving local storage
- Update the compatibility version of the clusters
- Reboot any running or suspended virtual machines to update their configuration
- Update the compatibility version of the data centers
1.1.1. Prerequisites Copy linkLink copied to clipboard!
- Plan for any necessary virtual machine downtime. After you update the clusters' compatibility versions during the upgrade, a new hardware configuration is automatically applied to each virtual machine once it reboots. You must reboot any running or suspended virtual machines as soon as possible to apply the configuration changes.
- Ensure your environment meets the requirements for Red Hat Virtualization 4.4. For a complete list of prerequisites, see the Planning and Prerequisites Guide.
- When upgrading Red Hat Virtualization Manager, it is recommended that you use one of the existing hosts. If you decide to use a new host, you must assign a unique name to the new host and then add it to the existing cluster before you begin the upgrade procedure.
1.1.2. Analyzing the Environment Copy linkLink copied to clipboard!
It is recommended to run the Log Collection Analysis tool and the Image Discrepancies tool prior to performing updates and for troubleshooting. These tools analyze your environment for known issues that might prevent you from performing an update, and provide recommendations to resolve them.
1.1.3. Log Collection Analysis tool Copy linkLink copied to clipboard!
Run the Log Collection Analysis tool prior to performing updates and for troubleshooting. The tool analyzes your environment for known issues that might prevent you from performing an update, and provides recommendations to resolve them. The tool gathers detailed information about your system and presents it as an HTML file.
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.3.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
Install the Log Collection Analysis tool on the Manager machine:
yum install rhv-log-collector-analyzer
# yum install rhv-log-collector-analyzerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run the tool:
rhv-log-collector-analyzer --live
# rhv-log-collector-analyzer --liveCopy to Clipboard Copied! Toggle word wrap Toggle overflow A detailed report is displayed.
By default, the report is saved to a file called
analyzer_report.html.To save the file to a specific location, use the
--htmlflag and specify the location:rhv-log-collector-analyzer --live --html=/directory/filename.html
# rhv-log-collector-analyzer --live --html=/directory/filename.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow You can use the ELinks text mode web browser to read the analyzer reports within the terminal. To install the ELinks browser:
yum install -y elinks
# yum install -y elinksCopy to Clipboard Copied! Toggle word wrap Toggle overflow Launch ELinks and open
analyzer_report.html.elinks /home/user1/analyzer_report.html
# elinks /home/user1/analyzer_report.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow To navigate the report, use the following commands in ELinks:
-
Insertto scroll up -
Deleteto scroll down -
PageUpto page up -
PageDownto page down -
Left Bracketto scroll left -
Right Bracketto scroll right
-
1.1.3.1. Monitoring snapshot health with the image discrepancies tool Copy linkLink copied to clipboard!
The RHV Image Discrepancies tool analyzes image data in the Storage Domain and RHV Database. It alerts you if it finds discrepancies in volumes and volume attributes, but does not fix those discrepancies. Use this tool in a variety of scenarios, such as:
- Before upgrading versions, to avoid carrying over broken volumes or chains to the new version.
- Following a failed storage operation, to detect volumes or attributes in a bad state.
- After restoring the RHV database or storage from backup.
- Periodically, to detect potential problems before they worsen.
- To analyze a snapshot- or live storage migration-related issues, and to verify system health after fixing these types of problems.
Prerequisites
-
Required Versions: this tool was introduced in RHV version 4.3.8 with
rhv-log-collector-analyzer-0.2.15-0.el7ev. - Because data collection runs simultaneously at different places and is not atomic, stop all activity in the environment that can modify the storage domains. That is, do not create or remove snapshots, edit, move, create, or remove disks. Otherwise, false detection of inconsistencies may occur. Virtual Machines can remain running normally during the process.
Procedure
To run the tool, enter the following command on the RHV Manager:
rhv-image-discrepancies
# rhv-image-discrepanciesCopy to Clipboard Copied! Toggle word wrap Toggle overflow - If the tool finds discrepancies, rerun it to confirm the results, especially if there is a chance some operations were performed while the tool was running.
This tool includes any Export and ISO storage domains and may report discrepancies for them. If so, these can be ignored, as these storage domains do not have entries for images in the RHV database.
Understanding the results
The tool reports the following:
- If there are volumes that appear on the storage but are not in the database, or appear in the database but are not on the storage.
- If some volume attributes differ between the storage and the database.
Sample output:
1.1.4. Migrating virtual machines from the self-hosted engine host Copy linkLink copied to clipboard!
Only the Manager virtual machine should remain on the host until after you have finished upgrading the host. Migrate any virtual machines other than the Manager virtual machine to another host in the same cluster.
You can use Live Migration to minimize virtual machine down-time. For more information, see Migrating Virtual Machines Between Hosts in the Virtual Machine Management Guide for more information.
1.1.5. Enabling global maintenance mode Copy linkLink copied to clipboard!
You must place the self-hosted engine environment in global maintenance mode before performing any setup or upgrade tasks on the Manager virtual machine.
Procedure
Log in to one of the self-hosted engine nodes and enable global maintenance mode:
hosted-engine --set-maintenance --mode=global
# hosted-engine --set-maintenance --mode=globalCopy to Clipboard Copied! Toggle word wrap Toggle overflow Confirm that the environment is in global maintenance mode before proceeding:
hosted-engine --vm-status
# hosted-engine --vm-statusCopy to Clipboard Copied! Toggle word wrap Toggle overflow You should see a message indicating that the cluster is in global maintenance mode.
You can now update the Manager to the latest version of 4.3.
1.1.6. Updating the Red Hat Virtualization Manager Copy linkLink copied to clipboard!
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.3.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
On the Manager machine, check if updated packages are available:
engine-upgrade-check
# engine-upgrade-checkCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the setup packages:
yum update ovirt\*setup\* rh\*vm-setup-plugins
# yum update ovirt\*setup\* rh\*vm-setup-pluginsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the Red Hat Virtualization Manager with the
engine-setupscript. Theengine-setupscript prompts you with some configuration questions, then stops theovirt-engineservice, downloads and installs the updated packages, backs up and updates the database, performs post-installation configuration, and starts theovirt-engineservice.engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow When the script completes successfully, the following message appears:
Execution of setup completed successfully
Execution of setup completed successfullyCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe
engine-setupscript is also used during the Red Hat Virtualization Manager installation process, and it stores the configuration values supplied. During an update, the stored values are displayed when previewing the configuration, and might not be up to date ifengine-configwas used to update configuration after installation. For example, ifengine-configwas used to updateSANWipeAfterDeletetotrueafter installation,engine-setupwill output "Default SAN wipe after delete: False" in the configuration preview. However, the updated values will not be overwritten byengine-setup.ImportantThe update process might take some time. Do not stop the process before it completes.
Update the base operating system and any optional packages installed on the Manager:
yum update --nobest
# yum update --nobestCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantIf you encounter a required Ansible package conflict during the update, see Cannot perform yum update on my RHV manager (ansible conflict).
ImportantIf any kernel packages were updated, reboot the machine to complete the update.
You can now upgrade the Manager to 4.4.
1.1.7. Upgrading the Red Hat Virtualization Manager from 4.3 to 4.4 Copy linkLink copied to clipboard!
The Red Hat Virtualization Manager 4.4 is only supported on Red Hat Enterprise Linux versions 8.2 to 8.6. You need to do a clean installation of Red Hat Enterprise Linux 8.6, or Red Hat Virtualization Host on the self-hosted engine host, even if you are using the same physical machine that you use to run the RHV 4.3 self-hosted engine.
The upgrade process requires restoring Red Hat Virtualization Manager 4.3 backup files onto the Red Hat Virtualization Manager 4.4 virtual machine.
Prerequisites
- All data centers and clusters in the environment must have the cluster compatibility level set to version 4.2 or 4.3.
- All virtual machines in the environment must have the cluster compatibility level set to version 4.3.
- Make note of the MAC address of the self-hosted engine if you are using DHCP and want to use the same IP address. The deploy script prompts you for this information.
- During the deployment you need to provide a new storage domain for the Manager machine. The deployment script renames the 4.3 storage domain and retains its data to enable disaster recovery.
Set the cluster scheduling policy to
cluster_maintenancein order to prevent automatic virtual machine migration during the upgrade.ImportantIn an environment with multiple highly available self-hosted engine nodes, you need to detach the storage domain hosting the version 4.3 Manager after upgrading the Manager to 4.4. Use a dedicated storage domain for the 4.4 self-hosted engine deployment.
- If you use an external CA to sign HTTPS certificates, follow the steps in Replacing the Red Hat Virtualization Manager CA Certificate in the Administration Guide. The backup and restore include the 3rd-party certificate, so you should be able to log in to the Administration portal after the upgrade. Ensure the CA certificate is added to system-wide trust stores of all clients to ensure the foreign menu of virt-viewer works. See BZ#1313379 for more information.
Connected hosts and virtual machines can continue to work while the Manager is being upgraded.
Procedure
Log in to the Manager virtual machine and shut down the engine service.
systemctl stop ovirt-engine
# systemctl stop ovirt-engineCopy to Clipboard Copied! Toggle word wrap Toggle overflow Back up the Red Hat Virtualization Manager 4.3 environment.
engine-backup --scope=all --mode=backup --file=backup.bck --log=backuplog.log
# engine-backup --scope=all --mode=backup --file=backup.bck --log=backuplog.logCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Copy the backup file to a storage device outside of the RHV environment.
Shut down the self-hosted engine.
shutdown
# shutdownCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteIf you want to reuse the self-hosted engine virtual machine to deploy the Red Hat Virtualization Manager 4.4, note the MAC address of the self-hosted engine network interface before you shut it down.
Make sure that the self-hosted engine is shut down.
hosted-engine --vm-status | grep -E 'Engine status|Hostname'
# hosted-engine --vm-status | grep -E 'Engine status|Hostname'Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteIf any of the hosts report the
detailfield asUp, log in to that specific host and shut it down with thehosted-engine --vm-shutdowncommand.Install RHVH 4.4 or Red Hat Enterprise Linux 8.6 on the existing node currently running the Manager virtual machine to use it as the self-hosted engine deployment host. See Installing the Self-hosted Engine Deployment Host for more information.
NoteIt is recommended that you use one of the existing hosts. If you decide to use a new host, you must assign a unique name to the new host and then add it to the existing cluster before you begin the upgrade procedure.
Install the self-hosted engine deployment tool.
yum install ovirt-hosted-engine-setup
# yum install ovirt-hosted-engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Copy the backup file to the host.
Log in to the Manager host and deploy the self-hosted engine with the backup file:
hosted-engine --deploy --restore-from-file=/path/backup.bck
# hosted-engine --deploy --restore-from-file=/path/backup.bckCopy to Clipboard Copied! Toggle word wrap Toggle overflow Notetmuxenables the deployment script to continue if the connection to the server is interrupted, so you can reconnect and attach to the deployment and continue. Otherwise, if the connection is interrupted during deployment, the deployment fails.To run the deployment script using
tmux, enter thetmuxcommand before you run the deployment script:tmux hosted-engine --deploy --restore-from-file=backup.bck
# tmux # hosted-engine --deploy --restore-from-file=backup.bckCopy to Clipboard Copied! Toggle word wrap Toggle overflow The deployment script automatically disables global maintenance mode and calls the HA agent to start the self-hosted engine virtual machine. The upgraded host with the 4.4 self-hosted engine reports that HA mode is active, but the other hosts report that global maintenance mode is still enabled as they are still connected to the old self-hosted engine storage.
- Detach the storage domain that hosts the Manager 4.3 machine. For details, see Detaching a Storage Domain from a Data Center in the Administration Guide.
Log in to the Manager virtual machine and shut down the engine service.
systemctl stop ovirt-engine
# systemctl stop ovirt-engineCopy to Clipboard Copied! Toggle word wrap Toggle overflow Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.4.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Install optional extension packages if they were installed on the Red Hat Virtualization Manager 4.3 machine.
yum install ovirt-engine-extension-aaa-ldap ovirt-engine-extension-aaa-misc
# yum install ovirt-engine-extension-aaa-ldap ovirt-engine-extension-aaa-miscCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe
ovirt-engine-extension-aaa-ldapis deprecated. For new installations, use Red Hat Single Sign On. For more information, see Installing and Configuring Red Hat Single Sign-On in the Administration Guide.NoteThe configuration for these package extensions must be manually reapplied because they are not migrated as part of the backup and restore process.
Configure the Manager by running the
engine-setupcommand:engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow
The Red Hat Virtualization Manager 4.4 is now installed, with the cluster compatibility version set to 4.2 or 4.3, whichever was the preexisting cluster compatibility version.
Additional resources
You can now update the self-hosted engine nodes, and then any standard hosts. The procedure is the same for both host types.
1.1.8. Migrating hosts and virtual machines from RHV 4.3 to 4.4 Copy linkLink copied to clipboard!
You can migrate hosts and virtual machines from Red Hat Virtualization 4.3 to 4.4 such that you minimize the downtime of virtual machines in your environment.
This process requires migrating all virtual machines from one host so as to make that host available to upgrade to RHV 4.4. After the upgrade, you can reattach the host to the Manager.
When installing or reinstalling the host’s operating system, Red Hat strongly recommends that you first detach any existing non-OS storage that is attached to the host to avoid accidental initialization of these disks, and with that, potential data loss.
CPU-passthrough virtual machines might not migrate properly from RHV 4.3 to RHV 4.4.
RHV 4.3 and RHV 4.4 are based on RHEL 7 and RHEL 8, respectively, which have different kernel versions with different CPU flags and microcodes. This can cause problems in migrating CPU-passthrough virtual machines.
Prerequisites
- Hosts for RHV 4.4 require Red Hat Enterprise Linux versions 8.2 to 8.6. A clean installation of Red Hat Enterprise Linux 8.6, or Red Hat Virtualization Host 4.4 is required, even if you are using the same physical machine that you use to run hosts for RHV 4.3.
- Red Hat Virtualization Manager 4.4 is installed and running.
- The compatibility level of the data center and cluster to which the hosts belong is set to 4.2 or 4.3. All data centers and clusters in the environment must have the cluster compatibility level set to version 4.2 or 4.3 before you start the procedure.
Procedure
- Pick a host to upgrade and migrate that host’s virtual machines to another host in the same cluster. You can use Live Migration to minimize virtual machine downtime. For more information, see Migrating Virtual Machines Between Hosts in the Virtual Machine Management Guide.
- Put the host into maintenance mode and remove the host from the Manager. For more information, see Removing a Host in the Administration Guide.
- Install Red Hat Enterprise Linux 8.6, or RHVH 4.4. For more information, see Installing Hosts for Red Hat Virtualization in one of the Installing Red Hat Virtualization guides.
- Install the appropriate packages to enable the host for RHV 4.4. For more information, see Installing Hosts for Red Hat Virtualization in one of the Installing Red Hat Virtualization guides.
- Add this host to the Manager, assigning it to the same cluster. You can now migrate virtual machines onto this host. For more information, see Adding Standard Hosts to the Manager in one of the Installing Red Hat Virtualization guides.
Repeat these steps to migrate virtual machines and upgrade hosts for the rest of the hosts in the same cluster, one by one, until all are running Red Hat Virtualization 4.4.
1.1.9. Upgrading RHVH while preserving local storage Copy linkLink copied to clipboard!
Environments with local storage cannot migrate virtual machines to a host in another cluster because the local storage is not shared with other storage domains. To upgrade RHVH 4.3 hosts that have a local storage domain, reinstall the host while preserving the local storage, create a new local storage domain in the 4.4 environment, and import the previous local storage into the new domain.
Prerequisites
- Red Hat Virtualization Manager 4.4 is installed and running.
- The compatibility level of the data center and cluster to which the host belongs is set to 4.2 or 4.3.
Procedure
Ensure that the local storage on the RHVH 4.3 host’s local storage is in maintenance mode before starting this process. Complete these steps:
- Open the Data Centers tab.
- Click the Storage tab in the Details pane and select the storage domain in the results list.
- Click Maintenance.
Reinstall the Red Hat Virtualization Host, as described in Installing Red Hat Virtualization Host in the Installation Guide.
ImportantWhen selecting the device on which to install RHVH from the Installation Destination screen, do not select the device(s) storing the virtual machines. Only select the device where the operating system should be installed.
If you are using Kickstart to install the host, ensure that you preserve the devices containing the virtual machines by adding the following to the Kickstart file, replacing `device` with the relevant device.
clearpart --all --drives=device
# clearpart --all --drives=deviceCopy to Clipboard Copied! Toggle word wrap Toggle overflow For more information on using Kickstart, see Kickstart references in Red Hat Enterprise Linux 8 Performing an advanced RHEL installation.
On the reinstalled host, create a directory, for example
/datain which to recover the previous environment.mkdir /data
# mkdir /dataCopy to Clipboard Copied! Toggle word wrap Toggle overflow Mount the previous local storage in the new directory. In our example,
/dev/sdX1is the local storage:mount /dev/sdX1 /data
# mount /dev/sdX1 /dataCopy to Clipboard Copied! Toggle word wrap Toggle overflow Set the following permissions for the new directory.
chown -R 36:36 /data chmod -R 0755 /data
# chown -R 36:36 /data # chmod -R 0755 /dataCopy to Clipboard Copied! Toggle word wrap Toggle overflow Red Hat recommends that you also automatically mount the local storage via
/etc/fstabin case the server requires a reboot:blkid | grep -i sdX1 /dev/sdX1: UUID="a81a6879-3764-48d0-8b21-2898c318ef7c" TYPE="ext4" vi /etc/fstab UUID="a81a6879-3764-48d0-8b21-2898c318ef7c" /data ext4 defaults 0 0
# blkid | grep -i sdX1 /dev/sdX1: UUID="a81a6879-3764-48d0-8b21-2898c318ef7c" TYPE="ext4" # vi /etc/fstab UUID="a81a6879-3764-48d0-8b21-2898c318ef7c" /data ext4 defaults 0 0Copy to Clipboard Copied! Toggle word wrap Toggle overflow - In the Administration Portal, create a data center and select Local in the Storage Type drop-down menu.
- Configure a cluster on the new data center. See Creating a New Cluster in the Administration Guide for more information.
- Add the host to the Manager. See Adding Standard Hosts to the Red Hat Virtualization Manager in one of the Installing Red Hat Virtualization guides for more information.
On the host, create a new directory that will be used to create the initial local storage domain. For example:
mkdir -p /localfs chown 36:36 /localfs chmod -R 0755 /localfs
# mkdir -p /localfs # chown 36:36 /localfs # chmod -R 0755 /localfsCopy to Clipboard Copied! Toggle word wrap Toggle overflow - In the Administration Portal, open the Storage tab and click New Domain to create a new local storage domain.
-
Set the name to
localfsand set the path to/localfs. -
Once the local storage is active, click Import Domain and set the domain’s details. For example, define
Dataas the name,Local on Hostas the storage type and/dataas the path. - Click to confirm the message that appears informing you that storage domains are already attached to the data center.
Activate the new storage domain:
- Open the Data Centers tab.
- Click the Storage tab in the details pane and select the new data storage domain in the results list.
- Click Activate.
Once the new storage domain is active, import the virtual machines and their disks:
- In the Storage tab, select data.
- Select the VM Import tab in the details pane, select the virtual machines and click Import. See Importing Virtual Machines from a Data Domain in the Virtual Machine Management Guide for more details.
-
Once you have ensured that all virtual machines have been successfully imported and are functioning properly, you can move
localfsto maintenance mode. Click the Storage tab and select localfs from the results list.
- Click the Data Center tab in the details pane.
- Click Maintenance, then click to move the storage domain to maintenance mode.
- Click Detach. The Detach Storage confirmation window opens.
- Click .
You have now upgraded the host to version 4.4, created a new local storage domain, and imported the 4.3 storage domain and its virtual machines.
1.1.10. Changing the Cluster Compatibility Version Copy linkLink copied to clipboard!
Red Hat Virtualization clusters have a compatibility version. The cluster compatibility version indicates the features of Red Hat Virtualization supported by all of the hosts in the cluster. The cluster compatibility is set according to the version of the least capable host operating system in the cluster.
Prerequisites
- To change the cluster compatibility level, you must first update all the hosts in your cluster to a level that supports your desired compatibility level. Check if there is an icon next to the host indicating an update is available.
Limitations
Virtio NICs are enumerated as a different device after upgrading the cluster compatibility level to 4.6. Therefore, the NICs might need to be reconfigured. Red Hat recommends that you test the virtual machines before you upgrade the cluster by setting the cluster compatibility level to 4.6 on the virtual machine and verifying the network connection.
If the network connection for the virtual machine fails, configure the virtual machine with a custom emulated machine that matches the current emulated machine, for example pc-q35-rhel8.3.0 for 4.5 compatibility version, before upgrading the cluster.
Procedure
- In the Administration Portal, click → .
- Select the cluster to change and click .
- On the General tab, change the Compatibility Version to the desired value.
- Click . The Change Cluster Compatibility Version confirmation dialog opens.
- Click to confirm.
An error message might warn that some virtual machines and templates are incorrectly configured. To fix this error, edit each virtual machine manually. The Edit Virtual Machine window provides additional validations and warnings that show what to correct. Sometimes the issue is automatically corrected and the virtual machine’s configuration just needs to be saved again. After editing each virtual machine, you will be able to change the cluster compatibility version.
1.1.11. Changing Virtual Machine Cluster Compatibility Copy linkLink copied to clipboard!
After updating a cluster’s compatibility version, you must update the cluster compatibility version of all running or suspended virtual machines by rebooting them from the Administration Portal, or using the REST API, or from within the guest operating system. Virtual machines that require a reboot are marked with the pending changes icon (
).
The Manager virtual machine does not need to be rebooted.
Although you can wait to reboot the virtual machines at a convenient time, rebooting immediately is highly recommended so that the virtual machines use the latest configuration. Any virtual machine that has not been rebooted runs with the previous configuration, and subsequent configuration changes made to the virtual machine might overwrite its pending cluster compatibility changes.
Procedure
- In the Administration Portal, click → .
Check which virtual machines require a reboot. In the Vms: search bar, enter the following query:
next_run_config_exists=True
next_run_config_exists=TrueCopy to Clipboard Copied! Toggle word wrap Toggle overflow The search results show all virtual machines with pending changes.
- Select each virtual machine and click Restart. Alternatively, if necessary you can reboot a virtual machine from within the virtual machine itself.
When the virtual machine starts, the new compatibility version is automatically applied.
You cannot change the cluster compatibility version of a virtual machine snapshot that is in preview. You must first commit or undo the preview.
1.1.12. Changing the Data Center Compatibility Version Copy linkLink copied to clipboard!
Red Hat Virtualization data centers have a compatibility version. The compatibility version indicates the version of Red Hat Virtualization with which the data center is intended to be compatible. All clusters in the data center must support the desired compatibility level.
Prerequisites
- To change the data center compatibility level, you must first update the compatibility version of all clusters and virtual machines in the data center.
Procedure
- In the Administration Portal, click → .
- Select the data center to change and click .
- Change the Compatibility Version to the desired value.
- Click . The Change Data Center Compatibility Version confirmation dialog opens.
- Click to confirm.
1.2. Upgrading a Self-Hosted Engine from Red Hat Virtualization 4.2 to 4.3 Copy linkLink copied to clipboard!
Upgrading a self-hosted engine environment from version 4.2 to 4.3 involves the following steps:
- Make sure you meet the prerequisites, including enabling the correct repositories
- Use the Log Collection Analysis tool and Image Discrepancies tool to check for issues that might prevent a successful upgrade
- Place the environment in global maintenance mode
- Update the 4.2 Manager to the latest version of 4.2
- Upgrade the Manager from 4.2 to 4.3
- Disable global maintenance mode
- Upgrade the self-hosted engine nodes, and any standard hosts
- Update the compatibility version of the clusters
- Reboot any running or suspended virtual machines to update their configuration
- Update the compatibility version of the data centers
- If you previously upgraded to 4.2 without replacing SHA-1 certificates with SHA-256 certificates, you must replace the certificates now.
1.2.1. Prerequisites Copy linkLink copied to clipboard!
- Plan for any necessary virtual machine downtime. After you update the clusters' compatibility versions during the upgrade, a new hardware configuration is automatically applied to each virtual machine once it reboots. You must reboot any running or suspended virtual machines as soon as possible to apply the configuration changes.
- Ensure your environment meets the requirements for Red Hat Virtualization 4.4. For a complete list of prerequisites, see the Planning and Prerequisites Guide.
- When upgrading Red Hat Virtualization Manager, it is recommended that you use one of the existing hosts. If you decide to use a new host, you must assign a unique name to the new host and then add it to the existing cluster before you begin the upgrade procedure.
1.2.2. Analyzing the Environment Copy linkLink copied to clipboard!
It is recommended to run the Log Collection Analysis tool and the Image Discrepancies tool prior to performing updates and for troubleshooting. These tools analyze your environment for known issues that might prevent you from performing an update, and provide recommendations to resolve them.
1.2.3. Log Collection Analysis tool Copy linkLink copied to clipboard!
Run the Log Collection Analysis tool prior to performing updates and for troubleshooting. The tool analyzes your environment for known issues that might prevent you from performing an update, and provides recommendations to resolve them. The tool gathers detailed information about your system and presents it as an HTML file.
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.2.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
Install the Log Collection Analysis tool on the Manager machine:
yum install rhv-log-collector-analyzer
# yum install rhv-log-collector-analyzerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run the tool:
rhv-log-collector-analyzer --live
# rhv-log-collector-analyzer --liveCopy to Clipboard Copied! Toggle word wrap Toggle overflow A detailed report is displayed.
By default, the report is saved to a file called
analyzer_report.html.To save the file to a specific location, use the
--htmlflag and specify the location:rhv-log-collector-analyzer --live --html=/directory/filename.html
# rhv-log-collector-analyzer --live --html=/directory/filename.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow You can use the ELinks text mode web browser to read the analyzer reports within the terminal. To install the ELinks browser:
yum install -y elinks
# yum install -y elinksCopy to Clipboard Copied! Toggle word wrap Toggle overflow Launch ELinks and open
analyzer_report.html.elinks /home/user1/analyzer_report.html
# elinks /home/user1/analyzer_report.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow To navigate the report, use the following commands in ELinks:
-
Insertto scroll up -
Deleteto scroll down -
PageUpto page up -
PageDownto page down -
Left Bracketto scroll left -
Right Bracketto scroll right
-
1.2.3.1. Monitoring snapshot health with the image discrepancies tool Copy linkLink copied to clipboard!
The RHV Image Discrepancies tool analyzes image data in the Storage Domain and RHV Database. It alerts you if it finds discrepancies in volumes and volume attributes, but does not fix those discrepancies. Use this tool in a variety of scenarios, such as:
- Before upgrading versions, to avoid carrying over broken volumes or chains to the new version.
- Following a failed storage operation, to detect volumes or attributes in a bad state.
- After restoring the RHV database or storage from backup.
- Periodically, to detect potential problems before they worsen.
- To analyze a snapshot- or live storage migration-related issues, and to verify system health after fixing these types of problems.
Prerequisites
-
Required Versions: this tool was introduced in RHV version 4.3.8 with
rhv-log-collector-analyzer-0.2.15-0.el7ev. - Because data collection runs simultaneously at different places and is not atomic, stop all activity in the environment that can modify the storage domains. That is, do not create or remove snapshots, edit, move, create, or remove disks. Otherwise, false detection of inconsistencies may occur. Virtual Machines can remain running normally during the process.
Procedure
To run the tool, enter the following command on the RHV Manager:
rhv-image-discrepancies
# rhv-image-discrepanciesCopy to Clipboard Copied! Toggle word wrap Toggle overflow - If the tool finds discrepancies, rerun it to confirm the results, especially if there is a chance some operations were performed while the tool was running.
This tool includes any Export and ISO storage domains and may report discrepancies for them. If so, these can be ignored, as these storage domains do not have entries for images in the RHV database.
Understanding the results
The tool reports the following:
- If there are volumes that appear on the storage but are not in the database, or appear in the database but are not on the storage.
- If some volume attributes differ between the storage and the database.
Sample output:
1.2.4. Enabling global maintenance mode Copy linkLink copied to clipboard!
You must place the self-hosted engine environment in global maintenance mode before performing any setup or upgrade tasks on the Manager virtual machine.
Procedure
Log in to one of the self-hosted engine nodes and enable global maintenance mode:
hosted-engine --set-maintenance --mode=global
# hosted-engine --set-maintenance --mode=globalCopy to Clipboard Copied! Toggle word wrap Toggle overflow Confirm that the environment is in global maintenance mode before proceeding:
hosted-engine --vm-status
# hosted-engine --vm-statusCopy to Clipboard Copied! Toggle word wrap Toggle overflow You should see a message indicating that the cluster is in global maintenance mode.
1.2.5. Updating the Red Hat Virtualization Manager Copy linkLink copied to clipboard!
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.2.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
On the Manager machine, check if updated packages are available:
engine-upgrade-check
# engine-upgrade-checkCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the setup packages:
yum update ovirt\*setup\* rh\*vm-setup-plugins
# yum update ovirt\*setup\* rh\*vm-setup-pluginsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the Red Hat Virtualization Manager with the
engine-setupscript. Theengine-setupscript prompts you with some configuration questions, then stops theovirt-engineservice, downloads and installs the updated packages, backs up and updates the database, performs post-installation configuration, and starts theovirt-engineservice.engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow When the script completes successfully, the following message appears:
Execution of setup completed successfully
Execution of setup completed successfullyCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe
engine-setupscript is also used during the Red Hat Virtualization Manager installation process, and it stores the configuration values supplied. During an update, the stored values are displayed when previewing the configuration, and might not be up to date ifengine-configwas used to update configuration after installation. For example, ifengine-configwas used to updateSANWipeAfterDeletetotrueafter installation,engine-setupwill output "Default SAN wipe after delete: False" in the configuration preview. However, the updated values will not be overwritten byengine-setup.ImportantThe update process might take some time. Do not stop the process before it completes.
Update the base operating system and any optional packages installed on the Manager:
yum update --nobest
# yum update --nobestCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantIf you encounter a required Ansible package conflict during the update, see Cannot perform yum update on my RHV manager (ansible conflict).
ImportantIf any kernel packages were updated, reboot the machine to complete the update.
1.2.6. Upgrading the Red Hat Virtualization Manager from 4.2 to 4.3 Copy linkLink copied to clipboard!
You need to be logged into the machine that you are upgrading.
If the upgrade fails, the engine-setup command attempts to restore your Red Hat Virtualization Manager installation to its previous state. For this reason, do not remove the previous version’s repositories until after the upgrade is complete. If the upgrade fails, the engine-setup script explains how to restore your installation.
Procedure
Enable the Red Hat Virtualization 4.3 repositories:
subscription-manager repos \ --enable=rhel-7-server-rhv-4.3-manager-rpms \ --enable=jb-eap-7.2-for-rhel-7-server-rpms# subscription-manager repos \ --enable=rhel-7-server-rhv-4.3-manager-rpms \ --enable=jb-eap-7.2-for-rhel-7-server-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow All other repositories remain the same across Red Hat Virtualization releases.
Update the setup packages:
yum update ovirt\*setup\* rh\*vm-setup-plugins
# yum update ovirt\*setup\* rh\*vm-setup-pluginsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run
engine-setupand follow the prompts to upgrade the Red Hat Virtualization Manager:engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow When the script completes successfully, the following message appears:
Execution of setup completed successfully
Execution of setup completed successfullyCopy to Clipboard Copied! Toggle word wrap Toggle overflow Disable the Red Hat Virtualization 4.2 repositories to ensure the system does not use any 4.2 packages:
subscription-manager repos \ --disable=rhel-7-server-rhv-4.2-manager-rpms \ --disable=jb-eap-7-for-rhel-7-server-rpms# subscription-manager repos \ --disable=rhel-7-server-rhv-4.2-manager-rpms \ --disable=jb-eap-7-for-rhel-7-server-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the base operating system:
yum update
# yum updateCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantIf you encounter a required Ansible package conflict during the update, see Cannot perform yum update on my RHV manager (ansible conflict).
ImportantIf any kernel packages were updated, reboot the machine to complete the upgrade.
The Manager is now upgraded to version 4.3.
1.2.7. Disabling global maintenance mode Copy linkLink copied to clipboard!
Procedure
- Log in to the Manager virtual machine and shut it down.
Log in to one of the self-hosted engine nodes and disable global maintenance mode:
hosted-engine --set-maintenance --mode=none
# hosted-engine --set-maintenance --mode=noneCopy to Clipboard Copied! Toggle word wrap Toggle overflow When you exit global maintenance mode, ovirt-ha-agent starts the Manager virtual machine, and then the Manager automatically starts. It can take up to ten minutes for the Manager to start.
Confirm that the environment is running:
hosted-engine --vm-status
# hosted-engine --vm-statusCopy to Clipboard Copied! Toggle word wrap Toggle overflow The listed information includes Engine Status. The value for Engine status should be:
{"health": "good", "vm": "up", "detail": "Up"}{"health": "good", "vm": "up", "detail": "Up"}Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteWhen the virtual machine is still booting and the Manager hasn’t started yet, the Engine status is:
{"reason": "bad vm status", "health": "bad", "vm": "up", "detail": "Powering up"}{"reason": "bad vm status", "health": "bad", "vm": "up", "detail": "Powering up"}Copy to Clipboard Copied! Toggle word wrap Toggle overflow If this happens, wait a few minutes and try again.
You can now update the self-hosted engine nodes, and then any standard hosts. The procedure is the same for both host types.
1.2.8. Updating All Hosts in a Cluster Copy linkLink copied to clipboard!
You can update all hosts in a cluster instead of updating hosts individually. This is particularly useful during upgrades to new versions of Red Hat Virtualization. See oVirt Cluster Upgrade for more information about the Ansible role used to automate the updates.
Update one cluster at a time.
Limitations
-
On RHVH, the update only preserves modified content in the
/etcand/vardirectories. Modified data in other paths is overwritten during an update. - If the cluster has migration enabled, virtual machines are automatically migrated to another host in the cluster.
- In a self-hosted engine environment, the Manager virtual machine can only migrate between self-hosted engine nodes in the same cluster. It cannot migrate to standard hosts.
- The cluster must have sufficient memory reserved for its hosts to perform maintenance. Otherwise, virtual machine migrations will hang and fail. You can reduce the memory usage of host updates by shutting down some or all virtual machines before updating hosts.
- You cannot migrate a pinned virtual machine (such as a virtual machine using a vGPU) to another host. Pinned virtual machines are shut down during the update, unless you choose to skip that host instead.
Procedure
- In the Administration Portal, click → and select the cluster. The Upgrade status column shows if an upgrade is available for any hosts in the cluster.
- Click Upgrade.
- Select the hosts to update, then click Next.
Configure the options:
- Stop Pinned VMs shuts down any virtual machines that are pinned to hosts in the cluster, and is selected by default. You can clear this check box to skip updating those hosts so that the pinned virtual machines stay running, such as when a pinned virtual machine is running important services or processes and you do not want it to shut down at an unknown time during the update.
-
Upgrade Timeout (Minutes) sets the time to wait for an individual host to be updated before the cluster upgrade fails with a timeout. The default is
60. You can increase it for large clusters where 60 minutes might not be enough, or reduce it for small clusters where the hosts update quickly. - Check Upgrade checks each host for available updates before running the upgrade process. It is not selected by default, but you can select it if you need to ensure that recent updates are included, such as when you have configured the Manager to check for host updates less frequently than the default.
- Reboot After Upgrade reboots each host after it is updated, and is selected by default. You can clear this check box to speed up the process if you are sure that there are no pending updates that require a host reboot.
-
Use Maintenance Policy sets the cluster’s scheduling policy to
cluster_maintenanceduring the update. It is selected by default, so activity is limited and virtual machines cannot start unless they are highly available. You can clear this check box if you have a custom scheduling policy that you want to keep using during the update, but this could have unknown consequences. Ensure your custom policy is compatible with cluster upgrade activity before disabling this option.
- Click Next.
- Review the summary of the hosts and virtual machines that will be affected.
- Click Upgrade.
You can track the progress of host updates:
- in the → view, the Upgrade Status column shows Upgrade in progress.
- in the → view
-
in the Events section of the Notification Drawer (
).
You can track the progress of individual virtual machine migrations in the Status column of the → view. In large environments, you may need to filter the results to show a particular group of virtual machines.
1.2.9. Changing the Cluster Compatibility Version Copy linkLink copied to clipboard!
Red Hat Virtualization clusters have a compatibility version. The cluster compatibility version indicates the features of Red Hat Virtualization supported by all of the hosts in the cluster. The cluster compatibility is set according to the version of the least capable host operating system in the cluster.
Prerequisites
- To change the cluster compatibility level, you must first update all the hosts in your cluster to a level that supports your desired compatibility level. Check if there is an icon next to the host indicating an update is available.
Limitations
Virtio NICs are enumerated as a different device after upgrading the cluster compatibility level to 4.6. Therefore, the NICs might need to be reconfigured. Red Hat recommends that you test the virtual machines before you upgrade the cluster by setting the cluster compatibility level to 4.6 on the virtual machine and verifying the network connection.
If the network connection for the virtual machine fails, configure the virtual machine with a custom emulated machine that matches the current emulated machine, for example pc-q35-rhel8.3.0 for 4.5 compatibility version, before upgrading the cluster.
Procedure
- In the Administration Portal, click → .
- Select the cluster to change and click .
- On the General tab, change the Compatibility Version to the desired value.
- Click . The Change Cluster Compatibility Version confirmation dialog opens.
- Click to confirm.
An error message might warn that some virtual machines and templates are incorrectly configured. To fix this error, edit each virtual machine manually. The Edit Virtual Machine window provides additional validations and warnings that show what to correct. Sometimes the issue is automatically corrected and the virtual machine’s configuration just needs to be saved again. After editing each virtual machine, you will be able to change the cluster compatibility version.
1.2.10. Changing Virtual Machine Cluster Compatibility Copy linkLink copied to clipboard!
After updating a cluster’s compatibility version, you must update the cluster compatibility version of all running or suspended virtual machines by rebooting them from the Administration Portal, or using the REST API, or from within the guest operating system. Virtual machines that require a reboot are marked with the pending changes icon (
).
The Manager virtual machine does not need to be rebooted.
Although you can wait to reboot the virtual machines at a convenient time, rebooting immediately is highly recommended so that the virtual machines use the latest configuration. Any virtual machine that has not been rebooted runs with the previous configuration, and subsequent configuration changes made to the virtual machine might overwrite its pending cluster compatibility changes.
Procedure
- In the Administration Portal, click → .
Check which virtual machines require a reboot. In the Vms: search bar, enter the following query:
next_run_config_exists=True
next_run_config_exists=TrueCopy to Clipboard Copied! Toggle word wrap Toggle overflow The search results show all virtual machines with pending changes.
- Select each virtual machine and click Restart. Alternatively, if necessary you can reboot a virtual machine from within the virtual machine itself.
When the virtual machine starts, the new compatibility version is automatically applied.
You cannot change the cluster compatibility version of a virtual machine snapshot that is in preview. You must first commit or undo the preview.
1.2.11. Changing the Data Center Compatibility Version Copy linkLink copied to clipboard!
Red Hat Virtualization data centers have a compatibility version. The compatibility version indicates the version of Red Hat Virtualization with which the data center is intended to be compatible. All clusters in the data center must support the desired compatibility level.
Prerequisites
- To change the data center compatibility level, you must first update the compatibility version of all clusters and virtual machines in the data center.
Procedure
- In the Administration Portal, click → .
- Select the data center to change and click .
- Change the Compatibility Version to the desired value.
- Click . The Change Data Center Compatibility Version confirmation dialog opens.
- Click to confirm.
If you previously upgraded to 4.2 without replacing SHA-1 certificates with SHA-256 certificates, you must do so now.
1.2.12. Replacing SHA-1 Certificates with SHA-256 Certificates Copy linkLink copied to clipboard!
Red Hat Virtualization 4.4 uses SHA-256 signatures, which provide a more secure way to sign SSL certificates than SHA-1. Newly installed systems do not require any special steps to enable Red Hat Virtualization’s public key infrastructure (PKI) to use SHA-256 signatures.
Do NOT let certificates expire. If they expire, the environment becomes non-responsive and recovery is an error prone and time consuming process. For information on renewing certificates, see Renewing certificates before they expire in the Administration Guide.
Preventing Warning Messages from Appearing in the Browser
- Log in to the Manager machine as the root user.
Check whether /etc/pki/ovirt-engine/openssl.conf includes the line
default_md = sha256:cat /etc/pki/ovirt-engine/openssl.conf
# cat /etc/pki/ovirt-engine/openssl.confCopy to Clipboard Copied! Toggle word wrap Toggle overflow If it still includes
default_md = sha1, back up the existing configuration and change the default tosha256:cp -p /etc/pki/ovirt-engine/openssl.conf /etc/pki/ovirt-engine/openssl.conf."$(date +"%Y%m%d%H%M%S")" sed -i 's/^default_md = sha1/default_md = sha256/' /etc/pki/ovirt-engine/openssl.conf
# cp -p /etc/pki/ovirt-engine/openssl.conf /etc/pki/ovirt-engine/openssl.conf."$(date +"%Y%m%d%H%M%S")" # sed -i 's/^default_md = sha1/default_md = sha256/' /etc/pki/ovirt-engine/openssl.confCopy to Clipboard Copied! Toggle word wrap Toggle overflow Define the certificate that should be re-signed:
names="apache"
# names="apache"Copy to Clipboard Copied! Toggle word wrap Toggle overflow Log in to one of the self-hosted engine nodes and enable global maintenance:
hosted-engine --set-maintenance --mode=global
# hosted-engine --set-maintenance --mode=globalCopy to Clipboard Copied! Toggle word wrap Toggle overflow On the Manager, save a backup of the
/etc/ovirt-engine/engine.conf.dand/etc/pki/ovirt-enginedirectories, and re-sign the certificates:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Do not change this the password value.
Restart the httpd service:
systemctl restart httpd
# systemctl restart httpdCopy to Clipboard Copied! Toggle word wrap Toggle overflow Log in to one of the self-hosted engine nodes and disable global maintenance:
hosted-engine --set-maintenance --mode=none
# hosted-engine --set-maintenance --mode=noneCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Connect to the Administration Portal to confirm that the warning no longer appears.
-
If you previously imported a CA or https certificate into the browser, find the certificate(s), remove them from the browser, and reimport the new CA certificate. Install the certificate authority according to the instructions provided by your browser. To get the certificate authority’s certificate, navigate to
http://your-manager-fqdn/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA, replacing your-manager-fqdn with the fully qualified domain name (FQDN).
Replacing All Signed Certificates with SHA-256
- Log in to the Manager machine as the root user.
Check whether /etc/pki/ovirt-engine/openssl.conf includes the line
default_md = sha256:cat /etc/pki/ovirt-engine/openssl.conf
# cat /etc/pki/ovirt-engine/openssl.confCopy to Clipboard Copied! Toggle word wrap Toggle overflow If it still includes
default_md = sha1, back up the existing configuration and change the default tosha256:cp -p /etc/pki/ovirt-engine/openssl.conf /etc/pki/ovirt-engine/openssl.conf."$(date +"%Y%m%d%H%M%S")" sed -i 's/^default_md = sha1/default_md = sha256/' /etc/pki/ovirt-engine/openssl.conf
# cp -p /etc/pki/ovirt-engine/openssl.conf /etc/pki/ovirt-engine/openssl.conf."$(date +"%Y%m%d%H%M%S")" # sed -i 's/^default_md = sha1/default_md = sha256/' /etc/pki/ovirt-engine/openssl.confCopy to Clipboard Copied! Toggle word wrap Toggle overflow Re-sign the CA certificate by backing it up and creating a new certificate in ca.pem.new:
cp -p /etc/pki/ovirt-engine/private/ca.pem /etc/pki/ovirt-engine/private/ca.pem."$(date +"%Y%m%d%H%M%S")" openssl x509 -signkey /etc/pki/ovirt-engine/private/ca.pem -in /etc/pki/ovirt-engine/ca.pem -out /etc/pki/ovirt-engine/ca.pem.new -days 3650 -sha256
# cp -p /etc/pki/ovirt-engine/private/ca.pem /etc/pki/ovirt-engine/private/ca.pem."$(date +"%Y%m%d%H%M%S")" # openssl x509 -signkey /etc/pki/ovirt-engine/private/ca.pem -in /etc/pki/ovirt-engine/ca.pem -out /etc/pki/ovirt-engine/ca.pem.new -days 3650 -sha256Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace the existing certificate with the new certificate:
mv /etc/pki/ovirt-engine/ca.pem.new /etc/pki/ovirt-engine/ca.pem
# mv /etc/pki/ovirt-engine/ca.pem.new /etc/pki/ovirt-engine/ca.pemCopy to Clipboard Copied! Toggle word wrap Toggle overflow Define the certificates that should be re-signed:
names="engine apache websocket-proxy jboss imageio-proxy"
# names="engine apache websocket-proxy jboss imageio-proxy"Copy to Clipboard Copied! Toggle word wrap Toggle overflow If you replaced the Red Hat Virtualization Manager SSL Certificate after the upgrade, run the following instead:
names="engine websocket-proxy jboss imageio-proxy"
# names="engine websocket-proxy jboss imageio-proxy"Copy to Clipboard Copied! Toggle word wrap Toggle overflow For more details see Replacing the Red Hat Virtualization Manager CA Certificate in the Administration Guide.
Log in to one of the self-hosted engine nodes and enable global maintenance:
hosted-engine --set-maintenance --mode=global
# hosted-engine --set-maintenance --mode=globalCopy to Clipboard Copied! Toggle word wrap Toggle overflow On the Manager, save a backup of the
/etc/ovirt-engine/engine.conf.dand/etc/pki/ovirt-enginedirectories, and re-sign the certificates:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Do not change this the password value.
Restart the following services:
systemctl restart httpd systemctl restart ovirt-engine systemctl restart ovirt-websocket-proxy systemctl restart ovirt-imageio
# systemctl restart httpd # systemctl restart ovirt-engine # systemctl restart ovirt-websocket-proxy # systemctl restart ovirt-imageioCopy to Clipboard Copied! Toggle word wrap Toggle overflow Log in to one of the self-hosted engine nodes and disable global maintenance:
hosted-engine --set-maintenance --mode=none
# hosted-engine --set-maintenance --mode=noneCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Connect to the Administration Portal to confirm that the warning no longer appears.
-
If you previously imported a CA or https certificate into the browser, find the certificate(s), remove them from the browser, and reimport the new CA certificate. Install the certificate authority according to the instructions provided by your browser. To get the certificate authority’s certificate, navigate to
http://your-manager-fqdn/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA, replacing your-manager-fqdn with the fully qualified domain name (FQDN). Enroll the certificates on the hosts. Repeat the following procedure for each host.
- In the Administration Portal, click → .
- Select the host and click → and .
- Once the host is in maintenance mode, click → .
- Click → .
Chapter 2. Upgrading a standalone Manager local database environment Copy linkLink copied to clipboard!
2.1. Upgrading from Red Hat Virtualization 4.3 to 4.4 Copy linkLink copied to clipboard!
Upgrading your environment from 4.3 to 4.4 involves the following steps:
Upgrade Considerations
- When planning to upgrade, see Red Hat Virtualization 4.4 upgrade considerations and known issues.
When upgrading from Open Virtual Network (OVN) and Open vSwitch (OvS) 2.11 to OVN 2021 and OvS 2.15, the process is transparent to the user as long as the following conditions are met:
- The Manager is upgraded first.
- The ovirt-provider-ovn security groups must be disabled, before the host upgrade, for all OVN networks that are expected to work between hosts with OVN/OvS version 2.11.
- The hosts are upgraded to match OVN version 2021 or higher and OvS version 2.15. You must complete this step in the Administration Portal, so you can properly reconfigure OVN and refresh the certificates.
- The host is rebooted after an upgrade.
To verify whether the provider and OVN were configured successfully on the host, check the OVN configured flag on the General tab for the host. If the OVN Configured is set to No, click → . This setting is also available in the REST API. If refreshing the capabilities fails, you can configure OVN by reinstalling the host from Manager 4.4 or higher.
- Make sure you meet the prerequisites, including enabling the correct repositories
- Use the Log Collection Analysis tool and Image Discrepancies tool to check for issues that might prevent a successful upgrade
- Update the 4.3 Manager to the latest version of 4.3
- Upgrade the Manager from 4.3 to 4.4
- Migrate hosts and virtual machines while reducing virtual machine downtime
- (Optional) Upgrade RHVH while preserving local storage
- Update the compatibility version of the clusters
- Reboot any running or suspended virtual machines to update their configuration
- Update the compatibility version of the data centers
2.1.1. Prerequisites Copy linkLink copied to clipboard!
- Plan for any necessary virtual machine downtime. After you update the clusters' compatibility versions during the upgrade, a new hardware configuration is automatically applied to each virtual machine once it reboots. You must reboot any running or suspended virtual machines as soon as possible to apply the configuration changes.
- Ensure your environment meets the requirements for Red Hat Virtualization 4.4. For a complete list of prerequisites, see the Planning and Prerequisites Guide.
- When upgrading Red Hat Virtualization Manager, it is recommended that you use one of the existing hosts. If you decide to use a new host, you must assign a unique name to the new host and then add it to the existing cluster before you begin the upgrade procedure.
2.1.2. Analyzing the Environment Copy linkLink copied to clipboard!
It is recommended to run the Log Collection Analysis tool and the Image Discrepancies tool prior to performing updates and for troubleshooting. These tools analyze your environment for known issues that might prevent you from performing an update, and provide recommendations to resolve them.
2.1.3. Log Collection Analysis tool Copy linkLink copied to clipboard!
Run the Log Collection Analysis tool prior to performing updates and for troubleshooting. The tool analyzes your environment for known issues that might prevent you from performing an update, and provides recommendations to resolve them. The tool gathers detailed information about your system and presents it as an HTML file.
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.3.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
Install the Log Collection Analysis tool on the Manager machine:
yum install rhv-log-collector-analyzer
# yum install rhv-log-collector-analyzerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run the tool:
rhv-log-collector-analyzer --live
# rhv-log-collector-analyzer --liveCopy to Clipboard Copied! Toggle word wrap Toggle overflow A detailed report is displayed.
By default, the report is saved to a file called
analyzer_report.html.To save the file to a specific location, use the
--htmlflag and specify the location:rhv-log-collector-analyzer --live --html=/directory/filename.html
# rhv-log-collector-analyzer --live --html=/directory/filename.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow You can use the ELinks text mode web browser to read the analyzer reports within the terminal. To install the ELinks browser:
yum install -y elinks
# yum install -y elinksCopy to Clipboard Copied! Toggle word wrap Toggle overflow Launch ELinks and open
analyzer_report.html.elinks /home/user1/analyzer_report.html
# elinks /home/user1/analyzer_report.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow To navigate the report, use the following commands in ELinks:
-
Insertto scroll up -
Deleteto scroll down -
PageUpto page up -
PageDownto page down -
Left Bracketto scroll left -
Right Bracketto scroll right
-
2.1.3.1. Monitoring snapshot health with the image discrepancies tool Copy linkLink copied to clipboard!
The RHV Image Discrepancies tool analyzes image data in the Storage Domain and RHV Database. It alerts you if it finds discrepancies in volumes and volume attributes, but does not fix those discrepancies. Use this tool in a variety of scenarios, such as:
- Before upgrading versions, to avoid carrying over broken volumes or chains to the new version.
- Following a failed storage operation, to detect volumes or attributes in a bad state.
- After restoring the RHV database or storage from backup.
- Periodically, to detect potential problems before they worsen.
- To analyze a snapshot- or live storage migration-related issues, and to verify system health after fixing these types of problems.
Prerequisites
-
Required Versions: this tool was introduced in RHV version 4.3.8 with
rhv-log-collector-analyzer-0.2.15-0.el7ev. - Because data collection runs simultaneously at different places and is not atomic, stop all activity in the environment that can modify the storage domains. That is, do not create or remove snapshots, edit, move, create, or remove disks. Otherwise, false detection of inconsistencies may occur. Virtual Machines can remain running normally during the process.
Procedure
To run the tool, enter the following command on the RHV Manager:
rhv-image-discrepancies
# rhv-image-discrepanciesCopy to Clipboard Copied! Toggle word wrap Toggle overflow - If the tool finds discrepancies, rerun it to confirm the results, especially if there is a chance some operations were performed while the tool was running.
This tool includes any Export and ISO storage domains and may report discrepancies for them. If so, these can be ignored, as these storage domains do not have entries for images in the RHV database.
Understanding the results
The tool reports the following:
- If there are volumes that appear on the storage but are not in the database, or appear in the database but are not on the storage.
- If some volume attributes differ between the storage and the database.
Sample output:
You can now update the Manager to the latest version of 4.3.
2.1.4. Updating the Red Hat Virtualization Manager Copy linkLink copied to clipboard!
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.3.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
On the Manager machine, check if updated packages are available:
engine-upgrade-check
# engine-upgrade-checkCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the setup packages:
yum update ovirt\*setup\* rh\*vm-setup-plugins
# yum update ovirt\*setup\* rh\*vm-setup-pluginsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the Red Hat Virtualization Manager with the
engine-setupscript. Theengine-setupscript prompts you with some configuration questions, then stops theovirt-engineservice, downloads and installs the updated packages, backs up and updates the database, performs post-installation configuration, and starts theovirt-engineservice.engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow When the script completes successfully, the following message appears:
Execution of setup completed successfully
Execution of setup completed successfullyCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe
engine-setupscript is also used during the Red Hat Virtualization Manager installation process, and it stores the configuration values supplied. During an update, the stored values are displayed when previewing the configuration, and might not be up to date ifengine-configwas used to update configuration after installation. For example, ifengine-configwas used to updateSANWipeAfterDeletetotrueafter installation,engine-setupwill output "Default SAN wipe after delete: False" in the configuration preview. However, the updated values will not be overwritten byengine-setup.ImportantThe update process might take some time. Do not stop the process before it completes.
Update the base operating system and any optional packages installed on the Manager:
yum update --nobest
# yum update --nobestCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantIf you encounter a required Ansible package conflict during the update, see Cannot perform yum update on my RHV manager (ansible conflict).
ImportantIf any kernel packages were updated, reboot the machine to complete the update.
You can now upgrade the Manager to 4.4.
2.1.5. Upgrading the Red Hat Virtualization Manager from 4.3 to 4.4 Copy linkLink copied to clipboard!
Red Hat Virtualization Manager 4.4 is only supported on Red Hat Enterprise Linux versions 8.2 to 8.6. You need to do a clean installation of Red Hat Enterprise Linux 8.6 and Red Hat Virtualization Manager 4.4, even if you are using the same physical machine that you use to run RHV Manager 4.3.
The upgrade process requires restoring Red Hat Virtualization Manager 4.3 backup files onto the Red Hat Virtualization Manager 4.4 machine.
Prerequisites
- All data centers and clusters in the environment must have the cluster compatibility level set to version 4.2 or 4.3.
- All virtual machines in the environment must have the cluster compatibility level set to version 4.3.
- If you use an external CA to sign HTTPS certificates, follow the steps in Replacing the Red Hat Virtualization Manager CA Certificate in the Administration Guide. The backup and restore include the 3rd-party certificate, so you should be able to log in to the Administration portal after the upgrade. Ensure the CA certificate is added to system-wide trust stores of all clients to ensure the foreign menu of virt-viewer works. See BZ#1313379 for more information.
Connected hosts and virtual machines can continue to work while the Manager is being upgraded.
Procedure
- Log in to the Manager machine.
Back up the Red Hat Virtualization Manager 4.3 environment.
engine-backup --scope=all --mode=backup --file=backup.bck --log=backuplog.log
# engine-backup --scope=all --mode=backup --file=backup.bck --log=backuplog.logCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Copy the backup file to a storage device outside of the RHV environment.
- Install Red Hat Enterprise Linux 8.6. See Performing a standard RHEL installation for more information.
-
Complete the steps to install Red Hat Virtualization Manager 4.4, including running the command
yum install rhvm, but do not runengine-setup. See one of the Installing Red Hat Virtualization guides for more information. Copy the backup file to the Red Hat Virtualization Manager 4.4 machine and restore it.
engine-backup --mode=restore --file=backup.bck --provision-all-databases
# engine-backup --mode=restore --file=backup.bck --provision-all-databasesCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteIf the backup contained grants for extra database users, this command creates the extra users with random passwords. You must change these passwords manually if the extra users require access to the restored system. See https://access.redhat.com/articles/2686731.
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.4.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Install optional extension packages if they were installed on the Red Hat Virtualization Manager 4.3 machine.
yum install ovirt-engine-extension-aaa-ldap ovirt-engine-extension-aaa-misc
# yum install ovirt-engine-extension-aaa-ldap ovirt-engine-extension-aaa-miscCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe
ovirt-engine-extension-aaa-ldapis deprecated. For new installations, use Red Hat Single Sign On. For more information, see Installing and Configuring Red Hat Single Sign-On in the Administration Guide.NoteThe configuration for these package extensions must be manually reapplied because they are not migrated as part of the backup and restore process.
Configure the Manager by running the
engine-setupcommand:engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Decommission the Red Hat Virtualization Manager 4.3 machine if a different machine is used for Red Hat Virtualization Manager 4.4. Two different Managers must not manage the same hosts or storage.
Run
engine-setupto configure the Manager.engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow
The Red Hat Virtualization Manager 4.4 is now installed, with the cluster compatibility version set to 4.2 or 4.3, whichever was the preexisting cluster compatibility version. Now you need to upgrade the hosts in your environment to RHV 4.4, after which you can change the cluster compatibility version to 4.4.
Additional resources
You can now update the hosts.
2.1.6. Migrating hosts and virtual machines from RHV 4.3 to 4.4 Copy linkLink copied to clipboard!
You can migrate hosts and virtual machines from Red Hat Virtualization 4.3 to 4.4 such that you minimize the downtime of virtual machines in your environment.
This process requires migrating all virtual machines from one host so as to make that host available to upgrade to RHV 4.4. After the upgrade, you can reattach the host to the Manager.
When installing or reinstalling the host’s operating system, Red Hat strongly recommends that you first detach any existing non-OS storage that is attached to the host to avoid accidental initialization of these disks, and with that, potential data loss.
CPU-passthrough virtual machines might not migrate properly from RHV 4.3 to RHV 4.4.
RHV 4.3 and RHV 4.4 are based on RHEL 7 and RHEL 8, respectively, which have different kernel versions with different CPU flags and microcodes. This can cause problems in migrating CPU-passthrough virtual machines.
Prerequisites
- Hosts for RHV 4.4 require Red Hat Enterprise Linux versions 8.2 to 8.6. A clean installation of Red Hat Enterprise Linux 8.6, or Red Hat Virtualization Host 4.4 is required, even if you are using the same physical machine that you use to run hosts for RHV 4.3.
- Red Hat Virtualization Manager 4.4 is installed and running.
- The compatibility level of the data center and cluster to which the hosts belong is set to 4.2 or 4.3. All data centers and clusters in the environment must have the cluster compatibility level set to version 4.2 or 4.3 before you start the procedure.
Procedure
- Pick a host to upgrade and migrate that host’s virtual machines to another host in the same cluster. You can use Live Migration to minimize virtual machine downtime. For more information, see Migrating Virtual Machines Between Hosts in the Virtual Machine Management Guide.
- Put the host into maintenance mode and remove the host from the Manager. For more information, see Removing a Host in the Administration Guide.
- Install Red Hat Enterprise Linux 8.6, or RHVH 4.4. For more information, see Installing Hosts for Red Hat Virtualization in one of the Installing Red Hat Virtualization guides.
- Install the appropriate packages to enable the host for RHV 4.4. For more information, see Installing Hosts for Red Hat Virtualization in one of the Installing Red Hat Virtualization guides.
- Add this host to the Manager, assigning it to the same cluster. You can now migrate virtual machines onto this host. For more information, see Adding Standard Hosts to the Manager in one of the Installing Red Hat Virtualization guides.
Repeat these steps to migrate virtual machines and upgrade hosts for the rest of the hosts in the same cluster, one by one, until all are running Red Hat Virtualization 4.4.
2.1.7. Upgrading RHVH while preserving local storage Copy linkLink copied to clipboard!
Environments with local storage cannot migrate virtual machines to a host in another cluster because the local storage is not shared with other storage domains. To upgrade RHVH 4.3 hosts that have a local storage domain, reinstall the host while preserving the local storage, create a new local storage domain in the 4.4 environment, and import the previous local storage into the new domain.
Prerequisites
- Red Hat Virtualization Manager 4.4 is installed and running.
- The compatibility level of the data center and cluster to which the host belongs is set to 4.2 or 4.3.
Procedure
Ensure that the local storage on the RHVH 4.3 host’s local storage is in maintenance mode before starting this process. Complete these steps:
- Open the Data Centers tab.
- Click the Storage tab in the Details pane and select the storage domain in the results list.
- Click Maintenance.
Reinstall the Red Hat Virtualization Host, as described in Installing Red Hat Virtualization Host in the Installation Guide.
ImportantWhen selecting the device on which to install RHVH from the Installation Destination screen, do not select the device(s) storing the virtual machines. Only select the device where the operating system should be installed.
If you are using Kickstart to install the host, ensure that you preserve the devices containing the virtual machines by adding the following to the Kickstart file, replacing `device` with the relevant device.
clearpart --all --drives=device
# clearpart --all --drives=deviceCopy to Clipboard Copied! Toggle word wrap Toggle overflow For more information on using Kickstart, see Kickstart references in Red Hat Enterprise Linux 8 Performing an advanced RHEL installation.
On the reinstalled host, create a directory, for example
/datain which to recover the previous environment.mkdir /data
# mkdir /dataCopy to Clipboard Copied! Toggle word wrap Toggle overflow Mount the previous local storage in the new directory. In our example,
/dev/sdX1is the local storage:mount /dev/sdX1 /data
# mount /dev/sdX1 /dataCopy to Clipboard Copied! Toggle word wrap Toggle overflow Set the following permissions for the new directory.
chown -R 36:36 /data chmod -R 0755 /data
# chown -R 36:36 /data # chmod -R 0755 /dataCopy to Clipboard Copied! Toggle word wrap Toggle overflow Red Hat recommends that you also automatically mount the local storage via
/etc/fstabin case the server requires a reboot:blkid | grep -i sdX1 /dev/sdX1: UUID="a81a6879-3764-48d0-8b21-2898c318ef7c" TYPE="ext4" vi /etc/fstab UUID="a81a6879-3764-48d0-8b21-2898c318ef7c" /data ext4 defaults 0 0
# blkid | grep -i sdX1 /dev/sdX1: UUID="a81a6879-3764-48d0-8b21-2898c318ef7c" TYPE="ext4" # vi /etc/fstab UUID="a81a6879-3764-48d0-8b21-2898c318ef7c" /data ext4 defaults 0 0Copy to Clipboard Copied! Toggle word wrap Toggle overflow - In the Administration Portal, create a data center and select Local in the Storage Type drop-down menu.
- Configure a cluster on the new data center. See Creating a New Cluster in the Administration Guide for more information.
- Add the host to the Manager. See Adding Standard Hosts to the Red Hat Virtualization Manager in one of the Installing Red Hat Virtualization guides for more information.
On the host, create a new directory that will be used to create the initial local storage domain. For example:
mkdir -p /localfs chown 36:36 /localfs chmod -R 0755 /localfs
# mkdir -p /localfs # chown 36:36 /localfs # chmod -R 0755 /localfsCopy to Clipboard Copied! Toggle word wrap Toggle overflow - In the Administration Portal, open the Storage tab and click New Domain to create a new local storage domain.
-
Set the name to
localfsand set the path to/localfs. -
Once the local storage is active, click Import Domain and set the domain’s details. For example, define
Dataas the name,Local on Hostas the storage type and/dataas the path. - Click to confirm the message that appears informing you that storage domains are already attached to the data center.
Activate the new storage domain:
- Open the Data Centers tab.
- Click the Storage tab in the details pane and select the new data storage domain in the results list.
- Click Activate.
Once the new storage domain is active, import the virtual machines and their disks:
- In the Storage tab, select data.
- Select the VM Import tab in the details pane, select the virtual machines and click Import. See Importing Virtual Machines from a Data Domain in the Virtual Machine Management Guide for more details.
-
Once you have ensured that all virtual machines have been successfully imported and are functioning properly, you can move
localfsto maintenance mode. Click the Storage tab and select localfs from the results list.
- Click the Data Center tab in the details pane.
- Click Maintenance, then click to move the storage domain to maintenance mode.
- Click Detach. The Detach Storage confirmation window opens.
- Click .
You have now upgraded the host to version 4.4, created a new local storage domain, and imported the 4.3 storage domain and its virtual machines.
2.1.8. Upgrading RHVH while preserving Gluster storage Copy linkLink copied to clipboard!
Environments with Gluster as storage can take a backup of Gluster storage and be restored after the RHVH upgrade. Try to keep workloads on all virtual machines using Gluster storage as light as possible to shorten the time required to upgrade. If there are highly write-intensive workloads, expect more time to restore.
GlusterFS Storage is deprecated, and will no longer be supported in future releases.
Prerequisites
- If there are geo-replication schedules on the storage domains, remove those schedules to avoid upgrade conflicts.
- No geo-replication sync are currently running.
- Additional disk space of 100 GB is required on 3 hosts for creating a new volume for the new RHVH 4.4 Manager deployment.
- All data centers and clusters in the environment must have a cluster compatibility level of 4.3 before you start the procedure.
Restriction
- Network-Bound Disk Encryption (NBDE) is supported only with new deployments with Red Hat Virtualization 4.4. This feature cannot be enabled during the upgrade.
Procedure
Create a new Gluster volume for RHVH 4.4 Manager deployment.
- Create a new brick on each host for the new RHVH 4.4 self-hosted engine virtual machine(VM).
- If you have a spare disk in the setup, follow the document Create Volume from the web console.
If there is enough space for a new Manager 100GB brick in the existing Volume Group(VG), it can be used as a new Manager Logical Volume (LV).
Run the following commands on all the hosts, unless specified otherwise explicitly:
Check the free size of the Volume Group (VG).
vgdisplay <VG_NAME> | grep -i free
# vgdisplay <VG_NAME> | grep -i freeCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create one more Logical Volume in this VG.
lvcreate -n gluster_lv_newengine -L 100G <EXISTING_VG>
# lvcreate -n gluster_lv_newengine -L 100G <EXISTING_VG>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Format the new Logical Volume (LV) as XFS.
mkfs.xfs <LV_NAME>
# mkfs.xfs <LV_NAME>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the mount point for the new brick.
mkdir /gluster_bricks/newengine
# mkdir /gluster_bricks/newengineCopy to Clipboard Copied! Toggle word wrap Toggle overflow -
Create an entry corresponding to the newly created filesystem in
/etc/fstaband mount the filesystem. Set the SELinux Labels on the brick mount points.
semanage fcontext -a -t glusterd_brick_t /gluster_bricks/newengine restorecon -Rv /gluster_bricks/newengine
# semanage fcontext -a -t glusterd_brick_t /gluster_bricks/newengine restorecon -Rv /gluster_bricks/newengineCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create a new gluster volume by executing the gluster command on one of the hosts in the cluster:
gluster volume create newengine replica 3 host1:/gluster_bricks/newengine/newengine host2:/gluster_bricks/newengine/newengine host3:/gluster_bricks/newengine/newengine
# gluster volume create newengine replica 3 host1:/gluster_bricks/newengine/newengine host2:/gluster_bricks/newengine/newengine host3:/gluster_bricks/newengine/newengineCopy to Clipboard Copied! Toggle word wrap Toggle overflow Set the required volume options on the newly created volume. Run the following commands on one of the hosts in the cluster:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Start the newly created Gluster volume. Run the following command on one of the hosts in the cluster.
gluster volume start newengine
# gluster volume start newengineCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Back up the Gluster configuration on all RHVH 4.3 nodes using the backup playbook.
The backup playbook is available with the latest version of RHVH 4.3. If this playbook is not available, create a playbook and inventory file:
/etc/ansible/roles/gluster.ansible/playbooks/hc-ansible-deployment/archive_config.yml
/etc/ansible/roles/gluster.ansible/playbooks/hc-ansible-deployment/archive_config.ymlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Edit the backup inventory file with correct details.
Common variables backup_dir -> Absolute path to directory that contains the extracted contents of the backup archive nbde_setup -> Set to false as the {virt-product-fullname} 4.3 setup doesn’t support NBDE upgrade -> Default value true . This value will make no effect with backupCommon variables backup_dir -> Absolute path to directory that contains the extracted contents of the backup archive nbde_setup -> Set to false as the {virt-product-fullname} 4.3 setup doesn’t support NBDE upgrade -> Default value true . This value will make no effect with backupCopy to Clipboard Copied! Toggle word wrap Toggle overflow Switch to the directory and execute the playbook.
ansible-playbook -i archive_config_inventory.yml archive_config.yml --tags backupfiles
ansible-playbook -i archive_config_inventory.yml archive_config.yml --tags backupfilesCopy to Clipboard Copied! Toggle word wrap Toggle overflow -
The generated backup configuration tar file is generated under /root with the name
RHVH-<HOSTNAME>-backup.tar.gz. On all the hosts, copy the backup configuration tar file to the backup host.
- Using the Manager Administration Portal, migrate the VMs running on the first host to other hosts in the cluster.
Backup Manager configurations.
engine-backup --mode=backup --scope=all --file=<backup-file.tar.gz> --log=<logfile>
# engine-backup --mode=backup --scope=all --file=<backup-file.tar.gz> --log=<logfile>Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteBefore creating a backup, do the following:
- Enable Global Maintenance for the self-hosted engine(SHE).
- Log in to the Manager VM using SSH and stop the ovirt-engine service.
- Copy the backup file from the self-hosted engine VM to the remote host.
- Shut down the Manager.
- Check for any pending self-heal tasks on all the replica 3 volumes. Wait for the heal to be completed.
Run the following command on one of the hosts:
gluster volume heal <volume> info summary
# gluster volume heal <volume> info summaryCopy to Clipboard Copied! Toggle word wrap Toggle overflow Stop the
glusterfsbrick process and unmount all the bricks on the first host to maintain file system consistency. Run the following on the first host:pkill glusterfsd; pkill glusterfs systemctl stop glusterd umount /gluster_bricks/*
# pkill glusterfsd; pkill glusterfs # systemctl stop glusterd # umount /gluster_bricks/*Copy to Clipboard Copied! Toggle word wrap Toggle overflow Reinstall the host with RHVH 4.4 ISO, only formatting the OS disk.
ImportantMake sure that the installation does not format the other disks, as bricks are created on top of those disks.
Once the node is up following the RHVH 4.4 installation reboot, subscribe to RHVH 4.4 repos as outlined in the Installation Guide, or install the downloaded RHVH 4.4 appliance.
yum install <appliance>
# yum install <appliance>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Disable the devices used for Gluster bricks.
- Create the new SSH private and public key pairs.
- Establish SSH public key authentication ( passwordless SSH ) to the same host, using frontend and backend network FQDN.
Create the inventory file:
/etc/ansible/roles/gluster.ansible/playbooks/hc-ansible-deployment/blacklist_inventory.yml
/etc/ansible/roles/gluster.ansible/playbooks/hc-ansible-deployment/blacklist_inventory.ymlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Run the playbook
ansible-playbook -i blacklist_inventory.yml /etc/ansible/roles/gluster.ansible/playbooks/hc-ansible-deployment/tasks/gluster_deployment.yml --tags blacklistdevices*
ansible-playbook -i blacklist_inventory.yml /etc/ansible/roles/gluster.ansible/playbooks/hc-ansible-deployment/tasks/gluster_deployment.yml --tags blacklistdevices*Copy to Clipboard Copied! Toggle word wrap Toggle overflow
- Copy the Manager backup and host config tar files from the backup host to the newly installed host and untar the content using scp.
Restore the Gluster configuration files.
Extract the contents of the Gluster configuration files
mkdir /archive # tar -xvf /root/ovirt-host-host1.example.com.tar.gz -C /archive/
# mkdir /archive # tar -xvf /root/ovirt-host-host1.example.com.tar.gz -C /archive/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Edit the inventory file to perform restoration of the configuration files. The Inventory file is available at
/etc/ansible/roles/gluster.ansible/playbooks/hc-ansible-deployment/archive_config_inventory.ymlExample playbook content:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantUse only one host under ‘hosts’ section of restoration playbook.
Use only one host under ‘hosts’ section of restoration playbook.Copy to Clipboard Copied! Toggle word wrap Toggle overflow Execute the playbook to restore configuration files
ansible-playbook -i archive_config_inventory.yml archive_config.yml --tags restorefiles
ansible-playbook -i archive_config_inventory.yml archive_config.yml --tags restorefilesCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Perform Manager deployment with the option
--restore-from-filepointing to the backed-up archive from the Manager. This Manager deployment can be done interactively using thehosted-engine --deploycommand, providing the storage corresponds to the newly created Manager volume. The same can also be done usingovirt-ansible-hosted-engine-setupin an automated procedure. The following procedure is an automated method for deploying a HostedEngine VM using the backup:Create a playbook for HostedEngine deployment in the newly installed host:
/etc/ansible/roles/gluster.ansible/playbooks/hc-ansible-deployment/he.yml- name: Deploy oVirt hosted engine hosts: localhost roles: - role: ovirt.hosted_engine_setup- name: Deploy oVirt hosted engine hosts: localhost roles: - role: ovirt.hosted_engine_setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the HostedEngine related information using the template file:
/etc/ansible/roles/gluster.ansible/playbooks/hc-ansible-deployment/he_gluster_vars.jsonExample:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Important- In the above he_gluster_vars.json, There are 2 important values: “he_restore_from_file” and “he_storage_domain_path”. The first option “he_restore_from_file” should point to the absolute file name of the Manager backup archive copied to the local machine. The second option “he_storage_domain_path” should refer to the newly created Gluster volume.
- Also note that the previous version of RHVH Version running inside the Manager VM is down and that will be discarded. MAC Address and FQDN corresponding to the older Manager VM can be reused for the new Manager as well.
For static Manager network configuration, add more options as listed below:
“he_vm_ip_addr”: “<engine VM ip address>” “he_vm_ip_prefix”: “<engine VM ip prefix>” “he_dns_addr”: “<engine VM DNS server>” “he_default_gateway”: “<engine VM default gateway>”
“he_vm_ip_addr”: “<engine VM ip address>” “he_vm_ip_prefix”: “<engine VM ip prefix>” “he_dns_addr”: “<engine VM DNS server>” “he_default_gateway”: “<engine VM default gateway>”Copy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantIf there is no specific DNS available, try to include 2 more options: “he_vm_etc_hosts”: true and “he_network_test”: “ping”
Run the playbook to deploy HostedEngine Deployment.
cd /etc/ansible/roles/gluster.ansible/playbooks/hc-ansible-deployment ansible-playbook he.yml --extra-vars "@he_gluster_vars.json"
# cd /etc/ansible/roles/gluster.ansible/playbooks/hc-ansible-deployment # ansible-playbook he.yml --extra-vars "@he_gluster_vars.json"Copy to Clipboard Copied! Toggle word wrap Toggle overflow Wait for the self-hosted engine deployment to complete.
ImportantIf there are any failures during self-hosted engine deployment, find the problem looking at the log messages under
/var/log/ovirt-hosted-engine-setup, fix the problem. Clean the failed self-hosted engine deployment using the commandovirt-hosted-engine-cleanupand rerun the deployment.
- Log in to the RHVH 4.4 Administration Portal on the newly installed Red Hat Virtualization manager. Make sure all the hosts are in the ‘up’ state, and wait for the self-heal on the Gluster volumes to be completed.
Upgrade the next host
- Move the next host (ideally, the next one in order), to Maintenance mode from the Administration Portal. Stop the Gluster service while moving this host to Maintenance mode.
From the command line of the host, unmount Gluster bricks
umount /gluster_bricks/*
# umount /gluster_bricks/*Copy to Clipboard Copied! Toggle word wrap Toggle overflow Reinstall this host with RHVH 4.4.
ImportantMake sure that the installation does not format the other disks, as bricks are created on top of those disks.
If multipath configuration is not available on the newly installed host, disable the Gluster devices. The inventory file is already created in the first host as part of the step Disable the devices used for Gluster bricks.
- Set up SSH public key authentication from the first host to the newly installed host.
- Update the inventory with the new host name.
- Execute the playbook.
- Copy the Gluster configuration tar files from the backup host to the newly installed host and untar the content.
Restore Gluster configuration on the newly installed host by executing the playbook as described in the step Restoring the Gluster configurations files on this host.
ImportantEdit the playbook on the newly installed host and execute it as described in the step Perform manager deployment with the option --restore-from-file…. Do not change hostname and execute on the same host.
Reinstall the host in RHVH Administration Portal Copy the authorized key from the first deployed host in RHVH 4.4
scp root@host1.example.com:/root/.ssh/authorized_keys /root/.ssh/
# scp root@host1.example.com:/root/.ssh/authorized_keys /root/.ssh/Copy to Clipboard Copied! Toggle word wrap Toggle overflow - In the Administration Portal, The host will be in ‘Maintenance’. Go to → → → .
- In the New Host dialog box HostedEngine tab, and select the deploy self-hosted engine deployment action.
- Wait for the host to reach Up status.
Make sure that there are no errors in the volumes related to GFID mismatch. If there are any errors, resolve them.
grep -i "gfid mismatch" /var/log/glusterfs/*
grep -i "gfid mismatch" /var/log/glusterfs/*Copy to Clipboard Copied! Toggle word wrap Toggle overflow
- Repeat the step Upgrade the next host for all the RHVH in the cluster.
- (optional) If a separate Gluster logical network exists in the cluster, attach the Gluster logical network to the required interface on each host.
Remove the old Manager storage domain. Identify the old Manager storage domain by the name hosted_storage with no gold star next to it, listed under → .
- Go to the → → → tab, and select Maintenance.
- Wait for the storage domain to move into Maintenance mode.
- Once the storage domain moves into Maintenance mode, click , the storage domain will move to unattached.
- Select the unattached storage domain, click , and confirm .
Stop and remove the old Manager volume.
- Go to → , and select the old Manager volume. Click , and confirm .
- Select the same volume, click , and confirm .
Update the cluster compatibility version.
Go to → and select the cluster Default, click , update the Compatibility Version to 4.4 and click .
ImportantThere will be a warning for changing compatibility version, which requires VMs on the cluster to be restarted. Click to confirm.
There are new Gluster volume options available with RHVH 4.4, apply those volume options on all the volumes. Execute the following on one of the nodes in the cluster:
for vol in gluster volume list; do gluster volume set $vol group virt; done
# for vol in gluster volume list; do gluster volume set $vol group virt; doneCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Remove the archives and extracted the contents of the backup configuration files on all nodes.
Creating an additional Gluster volume using the Web Console
- Log in to the Manager web console.
- Go to → and click .
Click . In the Create Volume window, do the following:
-
In the Hosts tab, select three different
ovirt-ng-nodeswith unused disks and click . - In the Volumes tab, specify the details of the volume you want to create and click .
- In the Bricks tab, specify the details of the disks to be used to create the volume and click .
- In the Review tab, check the generated configuration file for any incorrect information. When you are satisfied, click .
-
In the Hosts tab, select three different
You can now update the cluster compatibility version.
2.1.9. Changing the Cluster Compatibility Version Copy linkLink copied to clipboard!
Red Hat Virtualization clusters have a compatibility version. The cluster compatibility version indicates the features of Red Hat Virtualization supported by all of the hosts in the cluster. The cluster compatibility is set according to the version of the least capable host operating system in the cluster.
Prerequisites
- To change the cluster compatibility level, you must first update all the hosts in your cluster to a level that supports your desired compatibility level. Check if there is an icon next to the host indicating an update is available.
Limitations
Virtio NICs are enumerated as a different device after upgrading the cluster compatibility level to 4.6. Therefore, the NICs might need to be reconfigured. Red Hat recommends that you test the virtual machines before you upgrade the cluster by setting the cluster compatibility level to 4.6 on the virtual machine and verifying the network connection.
If the network connection for the virtual machine fails, configure the virtual machine with a custom emulated machine that matches the current emulated machine, for example pc-q35-rhel8.3.0 for 4.5 compatibility version, before upgrading the cluster.
Procedure
- In the Administration Portal, click → .
- Select the cluster to change and click .
- On the General tab, change the Compatibility Version to the desired value.
- Click . The Change Cluster Compatibility Version confirmation dialog opens.
- Click to confirm.
An error message might warn that some virtual machines and templates are incorrectly configured. To fix this error, edit each virtual machine manually. The Edit Virtual Machine window provides additional validations and warnings that show what to correct. Sometimes the issue is automatically corrected and the virtual machine’s configuration just needs to be saved again. After editing each virtual machine, you will be able to change the cluster compatibility version.
You can now update the cluster compatibility version for virtual machines in the cluster.
2.1.10. Changing Virtual Machine Cluster Compatibility Copy linkLink copied to clipboard!
After updating a cluster’s compatibility version, you must update the cluster compatibility version of all running or suspended virtual machines by rebooting them from the Administration Portal, or using the REST API, or from within the guest operating system. Virtual machines that require a reboot are marked with the pending changes icon (
).
Although you can wait to reboot the virtual machines at a convenient time, rebooting immediately is highly recommended so that the virtual machines use the latest configuration. Any virtual machine that has not been rebooted runs with the previous configuration, and subsequent configuration changes made to the virtual machine might overwrite its pending cluster compatibility changes.
Procedure
- In the Administration Portal, click → .
Check which virtual machines require a reboot. In the Vms: search bar, enter the following query:
next_run_config_exists=True
next_run_config_exists=TrueCopy to Clipboard Copied! Toggle word wrap Toggle overflow The search results show all virtual machines with pending changes.
- Select each virtual machine and click Restart. Alternatively, if necessary you can reboot a virtual machine from within the virtual machine itself.
When the virtual machine starts, the new compatibility version is automatically applied.
You cannot change the cluster compatibility version of a virtual machine snapshot that is in preview. You must first commit or undo the preview.
You can now update the data center compatibility version.
2.1.11. Changing the Data Center Compatibility Version Copy linkLink copied to clipboard!
Red Hat Virtualization data centers have a compatibility version. The compatibility version indicates the version of Red Hat Virtualization with which the data center is intended to be compatible. All clusters in the data center must support the desired compatibility level.
Prerequisites
- To change the data center compatibility level, you must first update the compatibility version of all clusters and virtual machines in the data center.
Procedure
- In the Administration Portal, click → .
- Select the data center to change and click .
- Change the Compatibility Version to the desired value.
- Click . The Change Data Center Compatibility Version confirmation dialog opens.
- Click to confirm.
2.2. Upgrading from Red Hat Virtualization 4.2 to 4.3 Copy linkLink copied to clipboard!
Upgrading your environment from 4.2 to 4.3 involves the following steps:
- Make sure you meet the prerequisites, including enabling the correct repositories
- Use the Log Collection Analysis tool and Image Discrepancies tool to check for issues that might prevent a successful upgrade
- Update the 4.2 Manager to the latest version of 4.2
- Upgrade the Manager from 4.2 to 4.3
- Update the hosts
- Update the compatibility version of the clusters
- Reboot any running or suspended virtual machines to update their configuration
- Update the compatibility version of the data centers
- If you previously upgraded to 4.2 without replacing SHA-1 certificates with SHA-256 certificates, you must replace the certificates now.
2.2.1. Prerequisites Copy linkLink copied to clipboard!
- Plan for any necessary virtual machine downtime. After you update the clusters' compatibility versions during the upgrade, a new hardware configuration is automatically applied to each virtual machine once it reboots. You must reboot any running or suspended virtual machines as soon as possible to apply the configuration changes.
- Ensure your environment meets the requirements for Red Hat Virtualization 4.4. For a complete list of prerequisites, see the Planning and Prerequisites Guide.
- When upgrading Red Hat Virtualization Manager, it is recommended that you use one of the existing hosts. If you decide to use a new host, you must assign a unique name to the new host and then add it to the existing cluster before you begin the upgrade procedure.
2.2.2. Analyzing the Environment Copy linkLink copied to clipboard!
It is recommended to run the Log Collection Analysis tool and the Image Discrepancies tool prior to performing updates and for troubleshooting. These tools analyze your environment for known issues that might prevent you from performing an update, and provide recommendations to resolve them.
2.2.3. Log Collection Analysis tool Copy linkLink copied to clipboard!
Run the Log Collection Analysis tool prior to performing updates and for troubleshooting. The tool analyzes your environment for known issues that might prevent you from performing an update, and provides recommendations to resolve them. The tool gathers detailed information about your system and presents it as an HTML file.
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.2.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
Install the Log Collection Analysis tool on the Manager machine:
yum install rhv-log-collector-analyzer
# yum install rhv-log-collector-analyzerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run the tool:
rhv-log-collector-analyzer --live
# rhv-log-collector-analyzer --liveCopy to Clipboard Copied! Toggle word wrap Toggle overflow A detailed report is displayed.
By default, the report is saved to a file called
analyzer_report.html.To save the file to a specific location, use the
--htmlflag and specify the location:rhv-log-collector-analyzer --live --html=/directory/filename.html
# rhv-log-collector-analyzer --live --html=/directory/filename.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow You can use the ELinks text mode web browser to read the analyzer reports within the terminal. To install the ELinks browser:
yum install -y elinks
# yum install -y elinksCopy to Clipboard Copied! Toggle word wrap Toggle overflow Launch ELinks and open
analyzer_report.html.elinks /home/user1/analyzer_report.html
# elinks /home/user1/analyzer_report.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow To navigate the report, use the following commands in ELinks:
-
Insertto scroll up -
Deleteto scroll down -
PageUpto page up -
PageDownto page down -
Left Bracketto scroll left -
Right Bracketto scroll right
-
2.2.3.1. Monitoring snapshot health with the image discrepancies tool Copy linkLink copied to clipboard!
The RHV Image Discrepancies tool analyzes image data in the Storage Domain and RHV Database. It alerts you if it finds discrepancies in volumes and volume attributes, but does not fix those discrepancies. Use this tool in a variety of scenarios, such as:
- Before upgrading versions, to avoid carrying over broken volumes or chains to the new version.
- Following a failed storage operation, to detect volumes or attributes in a bad state.
- After restoring the RHV database or storage from backup.
- Periodically, to detect potential problems before they worsen.
- To analyze a snapshot- or live storage migration-related issues, and to verify system health after fixing these types of problems.
Prerequisites
-
Required Versions: this tool was introduced in RHV version 4.3.8 with
rhv-log-collector-analyzer-0.2.15-0.el7ev. - Because data collection runs simultaneously at different places and is not atomic, stop all activity in the environment that can modify the storage domains. That is, do not create or remove snapshots, edit, move, create, or remove disks. Otherwise, false detection of inconsistencies may occur. Virtual Machines can remain running normally during the process.
Procedure
To run the tool, enter the following command on the RHV Manager:
rhv-image-discrepancies
# rhv-image-discrepanciesCopy to Clipboard Copied! Toggle word wrap Toggle overflow - If the tool finds discrepancies, rerun it to confirm the results, especially if there is a chance some operations were performed while the tool was running.
This tool includes any Export and ISO storage domains and may report discrepancies for them. If so, these can be ignored, as these storage domains do not have entries for images in the RHV database.
Understanding the results
The tool reports the following:
- If there are volumes that appear on the storage but are not in the database, or appear in the database but are not on the storage.
- If some volume attributes differ between the storage and the database.
Sample output:
2.2.4. Updating the Red Hat Virtualization Manager Copy linkLink copied to clipboard!
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.2.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
On the Manager machine, check if updated packages are available:
engine-upgrade-check
# engine-upgrade-checkCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the setup packages:
yum update ovirt\*setup\* rh\*vm-setup-plugins
# yum update ovirt\*setup\* rh\*vm-setup-pluginsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the Red Hat Virtualization Manager with the
engine-setupscript. Theengine-setupscript prompts you with some configuration questions, then stops theovirt-engineservice, downloads and installs the updated packages, backs up and updates the database, performs post-installation configuration, and starts theovirt-engineservice.engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow When the script completes successfully, the following message appears:
Execution of setup completed successfully
Execution of setup completed successfullyCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe
engine-setupscript is also used during the Red Hat Virtualization Manager installation process, and it stores the configuration values supplied. During an update, the stored values are displayed when previewing the configuration, and might not be up to date ifengine-configwas used to update configuration after installation. For example, ifengine-configwas used to updateSANWipeAfterDeletetotrueafter installation,engine-setupwill output "Default SAN wipe after delete: False" in the configuration preview. However, the updated values will not be overwritten byengine-setup.ImportantThe update process might take some time. Do not stop the process before it completes.
Update the base operating system and any optional packages installed on the Manager:
yum update --nobest
# yum update --nobestCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantIf you encounter a required Ansible package conflict during the update, see Cannot perform yum update on my RHV manager (ansible conflict).
ImportantIf any kernel packages were updated, reboot the machine to complete the update.
2.2.5. Upgrading the Red Hat Virtualization Manager from 4.2 to 4.3 Copy linkLink copied to clipboard!
You need to be logged into the machine that you are upgrading.
If the upgrade fails, the engine-setup command attempts to restore your Red Hat Virtualization Manager installation to its previous state. For this reason, do not remove the previous version’s repositories until after the upgrade is complete. If the upgrade fails, the engine-setup script explains how to restore your installation.
Procedure
Enable the Red Hat Virtualization 4.3 repositories:
subscription-manager repos \ --enable=rhel-7-server-rhv-4.3-manager-rpms \ --enable=jb-eap-7.2-for-rhel-7-server-rpms# subscription-manager repos \ --enable=rhel-7-server-rhv-4.3-manager-rpms \ --enable=jb-eap-7.2-for-rhel-7-server-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow All other repositories remain the same across Red Hat Virtualization releases.
Update the setup packages:
yum update ovirt\*setup\* rh\*vm-setup-plugins
# yum update ovirt\*setup\* rh\*vm-setup-pluginsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run
engine-setupand follow the prompts to upgrade the Red Hat Virtualization Manager:engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow When the script completes successfully, the following message appears:
Execution of setup completed successfully
Execution of setup completed successfullyCopy to Clipboard Copied! Toggle word wrap Toggle overflow Disable the Red Hat Virtualization 4.2 repositories to ensure the system does not use any 4.2 packages:
subscription-manager repos \ --disable=rhel-7-server-rhv-4.2-manager-rpms \ --disable=jb-eap-7-for-rhel-7-server-rpms# subscription-manager repos \ --disable=rhel-7-server-rhv-4.2-manager-rpms \ --disable=jb-eap-7-for-rhel-7-server-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the base operating system:
yum update
# yum updateCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantIf you encounter a required Ansible package conflict during the update, see Cannot perform yum update on my RHV manager (ansible conflict).
ImportantIf any kernel packages were updated, reboot the machine to complete the upgrade.
The Manager is now upgraded to version 4.3.
You can now update the hosts.
2.2.6. Updating All Hosts in a Cluster Copy linkLink copied to clipboard!
You can update all hosts in a cluster instead of updating hosts individually. This is particularly useful during upgrades to new versions of Red Hat Virtualization. See oVirt Cluster Upgrade for more information about the Ansible role used to automate the updates.
Update one cluster at a time.
Limitations
-
On RHVH, the update only preserves modified content in the
/etcand/vardirectories. Modified data in other paths is overwritten during an update. - If the cluster has migration enabled, virtual machines are automatically migrated to another host in the cluster.
- In a self-hosted engine environment, the Manager virtual machine can only migrate between self-hosted engine nodes in the same cluster. It cannot migrate to standard hosts.
- The cluster must have sufficient memory reserved for its hosts to perform maintenance. Otherwise, virtual machine migrations will hang and fail. You can reduce the memory usage of host updates by shutting down some or all virtual machines before updating hosts.
- You cannot migrate a pinned virtual machine (such as a virtual machine using a vGPU) to another host. Pinned virtual machines are shut down during the update, unless you choose to skip that host instead.
Procedure
- In the Administration Portal, click → and select the cluster. The Upgrade status column shows if an upgrade is available for any hosts in the cluster.
- Click Upgrade.
- Select the hosts to update, then click Next.
Configure the options:
- Stop Pinned VMs shuts down any virtual machines that are pinned to hosts in the cluster, and is selected by default. You can clear this check box to skip updating those hosts so that the pinned virtual machines stay running, such as when a pinned virtual machine is running important services or processes and you do not want it to shut down at an unknown time during the update.
-
Upgrade Timeout (Minutes) sets the time to wait for an individual host to be updated before the cluster upgrade fails with a timeout. The default is
60. You can increase it for large clusters where 60 minutes might not be enough, or reduce it for small clusters where the hosts update quickly. - Check Upgrade checks each host for available updates before running the upgrade process. It is not selected by default, but you can select it if you need to ensure that recent updates are included, such as when you have configured the Manager to check for host updates less frequently than the default.
- Reboot After Upgrade reboots each host after it is updated, and is selected by default. You can clear this check box to speed up the process if you are sure that there are no pending updates that require a host reboot.
-
Use Maintenance Policy sets the cluster’s scheduling policy to
cluster_maintenanceduring the update. It is selected by default, so activity is limited and virtual machines cannot start unless they are highly available. You can clear this check box if you have a custom scheduling policy that you want to keep using during the update, but this could have unknown consequences. Ensure your custom policy is compatible with cluster upgrade activity before disabling this option.
- Click Next.
- Review the summary of the hosts and virtual machines that will be affected.
- Click Upgrade.
You can track the progress of host updates:
- in the → view, the Upgrade Status column shows Upgrade in progress.
- in the → view
-
in the Events section of the Notification Drawer (
).
You can track the progress of individual virtual machine migrations in the Status column of the → view. In large environments, you may need to filter the results to show a particular group of virtual machines.
2.2.7. Changing the Cluster Compatibility Version Copy linkLink copied to clipboard!
Red Hat Virtualization clusters have a compatibility version. The cluster compatibility version indicates the features of Red Hat Virtualization supported by all of the hosts in the cluster. The cluster compatibility is set according to the version of the least capable host operating system in the cluster.
Prerequisites
- To change the cluster compatibility level, you must first update all the hosts in your cluster to a level that supports your desired compatibility level. Check if there is an icon next to the host indicating an update is available.
Limitations
Virtio NICs are enumerated as a different device after upgrading the cluster compatibility level to 4.6. Therefore, the NICs might need to be reconfigured. Red Hat recommends that you test the virtual machines before you upgrade the cluster by setting the cluster compatibility level to 4.6 on the virtual machine and verifying the network connection.
If the network connection for the virtual machine fails, configure the virtual machine with a custom emulated machine that matches the current emulated machine, for example pc-q35-rhel8.3.0 for 4.5 compatibility version, before upgrading the cluster.
Procedure
- In the Administration Portal, click → .
- Select the cluster to change and click .
- On the General tab, change the Compatibility Version to the desired value.
- Click . The Change Cluster Compatibility Version confirmation dialog opens.
- Click to confirm.
An error message might warn that some virtual machines and templates are incorrectly configured. To fix this error, edit each virtual machine manually. The Edit Virtual Machine window provides additional validations and warnings that show what to correct. Sometimes the issue is automatically corrected and the virtual machine’s configuration just needs to be saved again. After editing each virtual machine, you will be able to change the cluster compatibility version.
2.2.8. Changing Virtual Machine Cluster Compatibility Copy linkLink copied to clipboard!
After updating a cluster’s compatibility version, you must update the cluster compatibility version of all running or suspended virtual machines by rebooting them from the Administration Portal, or using the REST API, or from within the guest operating system. Virtual machines that require a reboot are marked with the pending changes icon (
).
Although you can wait to reboot the virtual machines at a convenient time, rebooting immediately is highly recommended so that the virtual machines use the latest configuration. Any virtual machine that has not been rebooted runs with the previous configuration, and subsequent configuration changes made to the virtual machine might overwrite its pending cluster compatibility changes.
Procedure
- In the Administration Portal, click → .
Check which virtual machines require a reboot. In the Vms: search bar, enter the following query:
next_run_config_exists=True
next_run_config_exists=TrueCopy to Clipboard Copied! Toggle word wrap Toggle overflow The search results show all virtual machines with pending changes.
- Select each virtual machine and click Restart. Alternatively, if necessary you can reboot a virtual machine from within the virtual machine itself.
When the virtual machine starts, the new compatibility version is automatically applied.
You cannot change the cluster compatibility version of a virtual machine snapshot that is in preview. You must first commit or undo the preview.
2.2.9. Changing the Data Center Compatibility Version Copy linkLink copied to clipboard!
Red Hat Virtualization data centers have a compatibility version. The compatibility version indicates the version of Red Hat Virtualization with which the data center is intended to be compatible. All clusters in the data center must support the desired compatibility level.
Prerequisites
- To change the data center compatibility level, you must first update the compatibility version of all clusters and virtual machines in the data center.
Procedure
- In the Administration Portal, click → .
- Select the data center to change and click .
- Change the Compatibility Version to the desired value.
- Click . The Change Data Center Compatibility Version confirmation dialog opens.
- Click to confirm.
If you previously upgraded to 4.2 without replacing SHA-1 certificates with SHA-256 certificates, you must do so now.
2.2.10. Replacing SHA-1 Certificates with SHA-256 Certificates Copy linkLink copied to clipboard!
Red Hat Virtualization 4.4 uses SHA-256 signatures, which provide a more secure way to sign SSL certificates than SHA-1. Newly installed systems do not require any special steps to enable Red Hat Virtualization’s public key infrastructure (PKI) to use SHA-256 signatures.
Do NOT let certificates expire. If they expire, the environment becomes non-responsive and recovery is an error prone and time consuming process. For information on renewing certificates, see Renewing certificates before they expire in the Administration Guide.
Preventing Warning Messages from Appearing in the Browser
- Log in to the Manager machine as the root user.
Check whether /etc/pki/ovirt-engine/openssl.conf includes the line
default_md = sha256:cat /etc/pki/ovirt-engine/openssl.conf
# cat /etc/pki/ovirt-engine/openssl.confCopy to Clipboard Copied! Toggle word wrap Toggle overflow If it still includes
default_md = sha1, back up the existing configuration and change the default tosha256:cp -p /etc/pki/ovirt-engine/openssl.conf /etc/pki/ovirt-engine/openssl.conf."$(date +"%Y%m%d%H%M%S")" sed -i 's/^default_md = sha1/default_md = sha256/' /etc/pki/ovirt-engine/openssl.conf
# cp -p /etc/pki/ovirt-engine/openssl.conf /etc/pki/ovirt-engine/openssl.conf."$(date +"%Y%m%d%H%M%S")" # sed -i 's/^default_md = sha1/default_md = sha256/' /etc/pki/ovirt-engine/openssl.confCopy to Clipboard Copied! Toggle word wrap Toggle overflow Define the certificate that should be re-signed:
names="apache"
# names="apache"Copy to Clipboard Copied! Toggle word wrap Toggle overflow On the Manager, save a backup of the
/etc/ovirt-engine/engine.conf.dand/etc/pki/ovirt-enginedirectories, and re-sign the certificates:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Do not change this the password value.
Restart the httpd service:
systemctl restart httpd
# systemctl restart httpdCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Connect to the Administration Portal to confirm that the warning no longer appears.
-
If you previously imported a CA or https certificate into the browser, find the certificate(s), remove them from the browser, and reimport the new CA certificate. Install the certificate authority according to the instructions provided by your browser. To get the certificate authority’s certificate, navigate to
http://your-manager-fqdn/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA, replacing your-manager-fqdn with the fully qualified domain name (FQDN).
Replacing All Signed Certificates with SHA-256
- Log in to the Manager machine as the root user.
Check whether /etc/pki/ovirt-engine/openssl.conf includes the line
default_md = sha256:cat /etc/pki/ovirt-engine/openssl.conf
# cat /etc/pki/ovirt-engine/openssl.confCopy to Clipboard Copied! Toggle word wrap Toggle overflow If it still includes
default_md = sha1, back up the existing configuration and change the default tosha256:cp -p /etc/pki/ovirt-engine/openssl.conf /etc/pki/ovirt-engine/openssl.conf."$(date +"%Y%m%d%H%M%S")" sed -i 's/^default_md = sha1/default_md = sha256/' /etc/pki/ovirt-engine/openssl.conf
# cp -p /etc/pki/ovirt-engine/openssl.conf /etc/pki/ovirt-engine/openssl.conf."$(date +"%Y%m%d%H%M%S")" # sed -i 's/^default_md = sha1/default_md = sha256/' /etc/pki/ovirt-engine/openssl.confCopy to Clipboard Copied! Toggle word wrap Toggle overflow Re-sign the CA certificate by backing it up and creating a new certificate in ca.pem.new:
cp -p /etc/pki/ovirt-engine/private/ca.pem /etc/pki/ovirt-engine/private/ca.pem."$(date +"%Y%m%d%H%M%S")" openssl x509 -signkey /etc/pki/ovirt-engine/private/ca.pem -in /etc/pki/ovirt-engine/ca.pem -out /etc/pki/ovirt-engine/ca.pem.new -days 3650 -sha256
# cp -p /etc/pki/ovirt-engine/private/ca.pem /etc/pki/ovirt-engine/private/ca.pem."$(date +"%Y%m%d%H%M%S")" # openssl x509 -signkey /etc/pki/ovirt-engine/private/ca.pem -in /etc/pki/ovirt-engine/ca.pem -out /etc/pki/ovirt-engine/ca.pem.new -days 3650 -sha256Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace the existing certificate with the new certificate:
mv /etc/pki/ovirt-engine/ca.pem.new /etc/pki/ovirt-engine/ca.pem
# mv /etc/pki/ovirt-engine/ca.pem.new /etc/pki/ovirt-engine/ca.pemCopy to Clipboard Copied! Toggle word wrap Toggle overflow Define the certificates that should be re-signed:
names="engine apache websocket-proxy jboss imageio-proxy"
# names="engine apache websocket-proxy jboss imageio-proxy"Copy to Clipboard Copied! Toggle word wrap Toggle overflow If you replaced the Red Hat Virtualization Manager SSL Certificate after the upgrade, run the following instead:
names="engine websocket-proxy jboss imageio-proxy"
# names="engine websocket-proxy jboss imageio-proxy"Copy to Clipboard Copied! Toggle word wrap Toggle overflow For more details see Replacing the Red Hat Virtualization Manager CA Certificate in the Administration Guide.
On the Manager, save a backup of the
/etc/ovirt-engine/engine.conf.dand/etc/pki/ovirt-enginedirectories, and re-sign the certificates:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Do not change this the password value.
Restart the following services:
systemctl restart httpd systemctl restart ovirt-engine systemctl restart ovirt-websocket-proxy systemctl restart ovirt-imageio
# systemctl restart httpd # systemctl restart ovirt-engine # systemctl restart ovirt-websocket-proxy # systemctl restart ovirt-imageioCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Connect to the Administration Portal to confirm that the warning no longer appears.
-
If you previously imported a CA or https certificate into the browser, find the certificate(s), remove them from the browser, and reimport the new CA certificate. Install the certificate authority according to the instructions provided by your browser. To get the certificate authority’s certificate, navigate to
http://your-manager-fqdn/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA, replacing your-manager-fqdn with the fully qualified domain name (FQDN). Enroll the certificates on the hosts. Repeat the following procedure for each host.
- In the Administration Portal, click → .
- Select the host and click → and .
- Once the host is in maintenance mode, click → .
- Click → .
Chapter 3. Upgrading a standalone Manager remote database environment Copy linkLink copied to clipboard!
3.1. Upgrading a Remote Database Environment from Red Hat Virtualization 4.3 to 4.4 Copy linkLink copied to clipboard!
Upgrading your environment from 4.3 to 4.4 involves the following steps:
Upgrade Considerations
- When planning to upgrade, see Red Hat Virtualization 4.4 upgrade considerations and known issues.
When upgrading from Open Virtual Network (OVN) and Open vSwitch (OvS) 2.11 to OVN 2021 and OvS 2.15, the process is transparent to the user as long as the following conditions are met:
- The Manager is upgraded first.
- The ovirt-provider-ovn security groups must be disabled, before the host upgrade, for all OVN networks that are expected to work between hosts with OVN/OvS version 2.11.
- The hosts are upgraded to match OVN version 2021 or higher and OvS version 2.15. You must complete this step in the Administration Portal, so you can properly reconfigure OVN and refresh the certificates.
- The host is rebooted after an upgrade.
To verify whether the provider and OVN were configured successfully on the host, check the OVN configured flag on the General tab for the host. If the OVN Configured is set to No, click → . This setting is also available in the REST API. If refreshing the capabilities fails, you can configure OVN by reinstalling the host from Manager 4.4 or higher.
- Make sure you meet the prerequisites, including enabling the correct repositories.
- Use the Log Collection Analysis tool and Image Discrepancies tool to check for issues that might prevent a successful upgrade.
- Update the 4.3 Manager to the latest version of 4.3.
- Upgrade the Manager from 4.3 to 4.4.
- Upgrade the remote Data Warehouse service and database.
- Migrate hosts and virtual machines while reducing virtual machine downtime.
- Optional: Upgrade RHVH while preserving local storage.
- Update the compatibility version of the clusters.
- Reboot any running or suspended virtual machines to update their configuration.
- Update the compatibility version of the data centers.
3.1.1. Prerequisites Copy linkLink copied to clipboard!
- Plan for any necessary virtual machine downtime. After you update the clusters' compatibility versions during the upgrade, a new hardware configuration is automatically applied to each virtual machine once it reboots. You must reboot any running or suspended virtual machines as soon as possible to apply the configuration changes.
- Ensure your environment meets the requirements for Red Hat Virtualization 4.4. For a complete list of prerequisites, see the Planning and Prerequisites Guide.
- When upgrading Red Hat Virtualization Manager, it is recommended that you use one of the existing hosts. If you decide to use a new host, you must assign a unique name to the new host and then add it to the existing cluster before you begin the upgrade procedure.
3.1.2. Analyzing the Environment Copy linkLink copied to clipboard!
It is recommended to run the Log Collection Analysis tool and the Image Discrepancies tool prior to performing updates and for troubleshooting. These tools analyze your environment for known issues that might prevent you from performing an update, and provide recommendations to resolve them.
3.1.3. Log Collection Analysis tool Copy linkLink copied to clipboard!
Run the Log Collection Analysis tool prior to performing updates and for troubleshooting. The tool analyzes your environment for known issues that might prevent you from performing an update, and provides recommendations to resolve them. The tool gathers detailed information about your system and presents it as an HTML file.
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.3.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
Install the Log Collection Analysis tool on the Manager machine:
yum install rhv-log-collector-analyzer
# yum install rhv-log-collector-analyzerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run the tool:
rhv-log-collector-analyzer --live
# rhv-log-collector-analyzer --liveCopy to Clipboard Copied! Toggle word wrap Toggle overflow A detailed report is displayed.
By default, the report is saved to a file called
analyzer_report.html.To save the file to a specific location, use the
--htmlflag and specify the location:rhv-log-collector-analyzer --live --html=/directory/filename.html
# rhv-log-collector-analyzer --live --html=/directory/filename.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow You can use the ELinks text mode web browser to read the analyzer reports within the terminal. To install the ELinks browser:
yum install -y elinks
# yum install -y elinksCopy to Clipboard Copied! Toggle word wrap Toggle overflow Launch ELinks and open
analyzer_report.html.elinks /home/user1/analyzer_report.html
# elinks /home/user1/analyzer_report.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow To navigate the report, use the following commands in ELinks:
-
Insertto scroll up -
Deleteto scroll down -
PageUpto page up -
PageDownto page down -
Left Bracketto scroll left -
Right Bracketto scroll right
-
3.1.3.1. Monitoring snapshot health with the image discrepancies tool Copy linkLink copied to clipboard!
The RHV Image Discrepancies tool analyzes image data in the Storage Domain and RHV Database. It alerts you if it finds discrepancies in volumes and volume attributes, but does not fix those discrepancies. Use this tool in a variety of scenarios, such as:
- Before upgrading versions, to avoid carrying over broken volumes or chains to the new version.
- Following a failed storage operation, to detect volumes or attributes in a bad state.
- After restoring the RHV database or storage from backup.
- Periodically, to detect potential problems before they worsen.
- To analyze a snapshot- or live storage migration-related issues, and to verify system health after fixing these types of problems.
Prerequisites
-
Required Versions: this tool was introduced in RHV version 4.3.8 with
rhv-log-collector-analyzer-0.2.15-0.el7ev. - Because data collection runs simultaneously at different places and is not atomic, stop all activity in the environment that can modify the storage domains. That is, do not create or remove snapshots, edit, move, create, or remove disks. Otherwise, false detection of inconsistencies may occur. Virtual Machines can remain running normally during the process.
Procedure
To run the tool, enter the following command on the RHV Manager:
rhv-image-discrepancies
# rhv-image-discrepanciesCopy to Clipboard Copied! Toggle word wrap Toggle overflow - If the tool finds discrepancies, rerun it to confirm the results, especially if there is a chance some operations were performed while the tool was running.
This tool includes any Export and ISO storage domains and may report discrepancies for them. If so, these can be ignored, as these storage domains do not have entries for images in the RHV database.
Understanding the results
The tool reports the following:
- If there are volumes that appear on the storage but are not in the database, or appear in the database but are not on the storage.
- If some volume attributes differ between the storage and the database.
Sample output:
You can now update the Manager to the latest version of 4.3.
3.1.4. Updating the Red Hat Virtualization Manager Copy linkLink copied to clipboard!
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.3.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
On the Manager machine, check if updated packages are available:
engine-upgrade-check
# engine-upgrade-checkCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the setup packages:
yum update ovirt\*setup\* rh\*vm-setup-plugins
# yum update ovirt\*setup\* rh\*vm-setup-pluginsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the Red Hat Virtualization Manager with the
engine-setupscript. Theengine-setupscript prompts you with some configuration questions, then stops theovirt-engineservice, downloads and installs the updated packages, backs up and updates the database, performs post-installation configuration, and starts theovirt-engineservice.engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow When the script completes successfully, the following message appears:
Execution of setup completed successfully
Execution of setup completed successfullyCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe
engine-setupscript is also used during the Red Hat Virtualization Manager installation process, and it stores the configuration values supplied. During an update, the stored values are displayed when previewing the configuration, and might not be up to date ifengine-configwas used to update configuration after installation. For example, ifengine-configwas used to updateSANWipeAfterDeletetotrueafter installation,engine-setupwill output "Default SAN wipe after delete: False" in the configuration preview. However, the updated values will not be overwritten byengine-setup.ImportantThe update process might take some time. Do not stop the process before it completes.
Update the base operating system and any optional packages installed on the Manager:
yum update --nobest
# yum update --nobestCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantIf you encounter a required Ansible package conflict during the update, see Cannot perform yum update on my RHV manager (ansible conflict).
ImportantIf any kernel packages were updated, reboot the machine to complete the update.
You can now upgrade the Manager to 4.4.
3.1.5. Upgrading the Red Hat Virtualization Manager from 4.3 to 4.4 Copy linkLink copied to clipboard!
Red Hat Virtualization Manager 4.4 is only supported on Red Hat Enterprise Linux versions 8.2 to 8.6. You need to do a clean installation of Red Hat Enterprise Linux 8.6 and Red Hat Virtualization Manager 4.4, even if you are using the same physical machine that you use to run RHV Manager 4.3.
The upgrade process requires restoring Red Hat Virtualization Manager 4.3 backup files onto the Red Hat Virtualization Manager 4.4 machine.
Prerequisites
- All data centers and clusters in the environment must have the cluster compatibility level set to version 4.2 or 4.3.
- All virtual machines in the environment must have the cluster compatibility level set to version 4.3.
- If you use an external CA to sign HTTPS certificates, follow the steps in Replacing the Red Hat Virtualization Manager CA Certificate in the Administration Guide. The backup and restore include the 3rd-party certificate, so you should be able to log in to the Administration portal after the upgrade. Ensure the CA certificate is added to system-wide trust stores of all clients to ensure the foreign menu of virt-viewer works. See BZ#1313379 for more information.
Connected hosts and virtual machines can continue to work while the Manager is being upgraded.
Procedure
- Log in to the Manager machine.
Back up the Red Hat Virtualization Manager 4.3 environment.
engine-backup --scope=all --mode=backup --file=backup.bck --log=backuplog.log
# engine-backup --scope=all --mode=backup --file=backup.bck --log=backuplog.logCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Copy the backup file to a storage device outside of the RHV environment.
- Install Red Hat Enterprise Linux 8.6. See Performing a standard RHEL installation for more information.
-
Complete the steps to install Red Hat Virtualization Manager 4.4, including running the command
yum install rhvm, but do not runengine-setup. See one of the Installing Red Hat Virtualization guides for more information. Copy the backup file to the Red Hat Virtualization Manager 4.4 machine and restore it.
engine-backup --mode=restore --file=backup.bck --provision-all-databases
# engine-backup --mode=restore --file=backup.bck --provision-all-databasesCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteIf the backup contained grants for extra database users, this command creates the extra users with random passwords. You must change these passwords manually if the extra users require access to the restored system. See https://access.redhat.com/articles/2686731.
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.4.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Install optional extension packages if they were installed on the Red Hat Virtualization Manager 4.3 machine.
yum install ovirt-engine-extension-aaa-ldap ovirt-engine-extension-aaa-misc
# yum install ovirt-engine-extension-aaa-ldap ovirt-engine-extension-aaa-miscCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe
ovirt-engine-extension-aaa-ldapis deprecated. For new installations, use Red Hat Single Sign On. For more information, see Installing and Configuring Red Hat Single Sign-On in the Administration Guide.NoteThe configuration for these package extensions must be manually reapplied because they are not migrated as part of the backup and restore process.
Configure the Manager by running the
engine-setupcommand:engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Decommission the Red Hat Virtualization Manager 4.3 machine if a different machine is used for Red Hat Virtualization Manager 4.4. Two different Managers must not manage the same hosts or storage.
The Red Hat Virtualization Manager 4.4 is now installed, with the cluster compatibility version set to 4.2 or 4.3, whichever was the preexisting cluster compatibility version.
Now you need to upgrade the remote databases in your environment.
'engine-setup' also stops the Data Warehouse service on the remote Data Warehouse machine.
If you intend to postpone the next parts of this procedure, log in to the Data Warehouse machine and start the Data Warehouse service:
systemctl start ovirt-engine-dwhd.service
# systemctl start ovirt-engine-dwhd.service
3.1.6. Upgrading the remote Data Warehouse service and database Copy linkLink copied to clipboard!
Run this procedure on the remote machine with the Data Warehouse service and database.
Notice that part of this procedure requires you to install Red Hat Enterprise Linux 8.6, or Red Hat Virtualization Host 4.4.
Prerequisites
- You are logged in to the Data Warehouse machine.
- A storage device outside the RHV environment.
Procedure
Back up the Data Warehouse machine.
NoteGrafana is not supported on RHV 4.3, but on RHV 4.4, this command also includes the Grafana service and the Grafana database.
engine-backup --file=<backupfile>
# engine-backup --file=<backupfile>Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Copy the backup file to a storage device.
Stop and disable the Data Warehouse service:
systemctl stop ovirt-engine-dwhd systemctl disable ovirt-engine-dwhd
# systemctl stop ovirt-engine-dwhd # systemctl disable ovirt-engine-dwhdCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Reinstall the Data Warehouse machine with Red Hat Enterprise Linux 8.6, or Red Hat Virtualization Host 4.4.
- Prepare a PostgreSQL database. For information, see Preparing a Remote PostgreSQL Database in Installing Red Hat Virtualization as a standalone Manager with remote databases.
-
Enable the correct repositories on the server and install the Data Warehouse service. For detailed instructions, see Installing and Configuring Data Warehouse on a Separate Machine for Red Hat Virtualization 4.4. Complete the steps in that procedure up to and including the
dnf install ovirt-engine-dwh-setupcommand. Then continue to the next step in this procedure. - Copy the backup file from the storage device to the Data Warehouse machine.
Restore the backup file:
engine-backup --mode=restore --file=backup.bck --provision-all-databases
# engine-backup --mode=restore --file=backup.bck --provision-all-databasesCopy to Clipboard Copied! Toggle word wrap Toggle overflow On the Data Warehouse machine, run the
engine-setupcommand:engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow On the Manager machine, restart the Manager to connect it to the Data Warehouse database:
systemctl restart ovirt-engine
# systemctl restart ovirt-engineCopy to Clipboard Copied! Toggle word wrap Toggle overflow
You can now update the hosts.
3.1.7. Migrating hosts and virtual machines from RHV 4.3 to 4.4 Copy linkLink copied to clipboard!
You can migrate hosts and virtual machines from Red Hat Virtualization 4.3 to 4.4 such that you minimize the downtime of virtual machines in your environment.
This process requires migrating all virtual machines from one host so as to make that host available to upgrade to RHV 4.4. After the upgrade, you can reattach the host to the Manager.
When installing or reinstalling the host’s operating system, Red Hat strongly recommends that you first detach any existing non-OS storage that is attached to the host to avoid accidental initialization of these disks, and with that, potential data loss.
CPU-passthrough virtual machines might not migrate properly from RHV 4.3 to RHV 4.4.
RHV 4.3 and RHV 4.4 are based on RHEL 7 and RHEL 8, respectively, which have different kernel versions with different CPU flags and microcodes. This can cause problems in migrating CPU-passthrough virtual machines.
Prerequisites
- Hosts for RHV 4.4 require Red Hat Enterprise Linux versions 8.2 to 8.6. A clean installation of Red Hat Enterprise Linux 8.6, or Red Hat Virtualization Host 4.4 is required, even if you are using the same physical machine that you use to run hosts for RHV 4.3.
- Red Hat Virtualization Manager 4.4 is installed and running.
- The compatibility level of the data center and cluster to which the hosts belong is set to 4.2 or 4.3. All data centers and clusters in the environment must have the cluster compatibility level set to version 4.2 or 4.3 before you start the procedure.
Procedure
- Pick a host to upgrade and migrate that host’s virtual machines to another host in the same cluster. You can use Live Migration to minimize virtual machine downtime. For more information, see Migrating Virtual Machines Between Hosts in the Virtual Machine Management Guide.
- Put the host into maintenance mode and remove the host from the Manager. For more information, see Removing a Host in the Administration Guide.
- Install Red Hat Enterprise Linux 8.6, or RHVH 4.4. For more information, see Installing Hosts for Red Hat Virtualization in one of the Installing Red Hat Virtualization guides.
- Install the appropriate packages to enable the host for RHV 4.4. For more information, see Installing Hosts for Red Hat Virtualization in one of the Installing Red Hat Virtualization guides.
- Add this host to the Manager, assigning it to the same cluster. You can now migrate virtual machines onto this host. For more information, see Adding Standard Hosts to the Manager in one of the Installing Red Hat Virtualization guides.
Repeat these steps to migrate virtual machines and upgrade hosts for the rest of the hosts in the same cluster, one by one, until all are running Red Hat Virtualization 4.4.
3.1.8. Upgrading RHVH while preserving local storage Copy linkLink copied to clipboard!
Environments with local storage cannot migrate virtual machines to a host in another cluster because the local storage is not shared with other storage domains. To upgrade RHVH 4.3 hosts that have a local storage domain, reinstall the host while preserving the local storage, create a new local storage domain in the 4.4 environment, and import the previous local storage into the new domain.
Prerequisites
- Red Hat Virtualization Manager 4.4 is installed and running.
- The compatibility level of the data center and cluster to which the host belongs is set to 4.2 or 4.3.
Procedure
Ensure that the local storage on the RHVH 4.3 host’s local storage is in maintenance mode before starting this process. Complete these steps:
- Open the Data Centers tab.
- Click the Storage tab in the Details pane and select the storage domain in the results list.
- Click Maintenance.
Reinstall the Red Hat Virtualization Host, as described in Installing Red Hat Virtualization Host in the Installation Guide.
ImportantWhen selecting the device on which to install RHVH from the Installation Destination screen, do not select the device(s) storing the virtual machines. Only select the device where the operating system should be installed.
If you are using Kickstart to install the host, ensure that you preserve the devices containing the virtual machines by adding the following to the Kickstart file, replacing `device` with the relevant device.
clearpart --all --drives=device
# clearpart --all --drives=deviceCopy to Clipboard Copied! Toggle word wrap Toggle overflow For more information on using Kickstart, see Kickstart references in Red Hat Enterprise Linux 8 Performing an advanced RHEL installation.
On the reinstalled host, create a directory, for example
/datain which to recover the previous environment.mkdir /data
# mkdir /dataCopy to Clipboard Copied! Toggle word wrap Toggle overflow Mount the previous local storage in the new directory. In our example,
/dev/sdX1is the local storage:mount /dev/sdX1 /data
# mount /dev/sdX1 /dataCopy to Clipboard Copied! Toggle word wrap Toggle overflow Set the following permissions for the new directory.
chown -R 36:36 /data chmod -R 0755 /data
# chown -R 36:36 /data # chmod -R 0755 /dataCopy to Clipboard Copied! Toggle word wrap Toggle overflow Red Hat recommends that you also automatically mount the local storage via
/etc/fstabin case the server requires a reboot:blkid | grep -i sdX1 /dev/sdX1: UUID="a81a6879-3764-48d0-8b21-2898c318ef7c" TYPE="ext4" vi /etc/fstab UUID="a81a6879-3764-48d0-8b21-2898c318ef7c" /data ext4 defaults 0 0
# blkid | grep -i sdX1 /dev/sdX1: UUID="a81a6879-3764-48d0-8b21-2898c318ef7c" TYPE="ext4" # vi /etc/fstab UUID="a81a6879-3764-48d0-8b21-2898c318ef7c" /data ext4 defaults 0 0Copy to Clipboard Copied! Toggle word wrap Toggle overflow - In the Administration Portal, create a data center and select Local in the Storage Type drop-down menu.
- Configure a cluster on the new data center. See Creating a New Cluster in the Administration Guide for more information.
- Add the host to the Manager. See Adding Standard Hosts to the Red Hat Virtualization Manager in one of the Installing Red Hat Virtualization guides for more information.
On the host, create a new directory that will be used to create the initial local storage domain. For example:
mkdir -p /localfs chown 36:36 /localfs chmod -R 0755 /localfs
# mkdir -p /localfs # chown 36:36 /localfs # chmod -R 0755 /localfsCopy to Clipboard Copied! Toggle word wrap Toggle overflow - In the Administration Portal, open the Storage tab and click New Domain to create a new local storage domain.
-
Set the name to
localfsand set the path to/localfs. -
Once the local storage is active, click Import Domain and set the domain’s details. For example, define
Dataas the name,Local on Hostas the storage type and/dataas the path. - Click to confirm the message that appears informing you that storage domains are already attached to the data center.
Activate the new storage domain:
- Open the Data Centers tab.
- Click the Storage tab in the details pane and select the new data storage domain in the results list.
- Click Activate.
Once the new storage domain is active, import the virtual machines and their disks:
- In the Storage tab, select data.
- Select the VM Import tab in the details pane, select the virtual machines and click Import. See Importing Virtual Machines from a Data Domain in the Virtual Machine Management Guide for more details.
-
Once you have ensured that all virtual machines have been successfully imported and are functioning properly, you can move
localfsto maintenance mode. Click the Storage tab and select localfs from the results list.
- Click the Data Center tab in the details pane.
- Click Maintenance, then click to move the storage domain to maintenance mode.
- Click Detach. The Detach Storage confirmation window opens.
- Click .
You have now upgraded the host to version 4.4, created a new local storage domain, and imported the 4.3 storage domain and its virtual machines.
You can now update the cluster compatibility version.
3.1.9. Changing the Cluster Compatibility Version Copy linkLink copied to clipboard!
Red Hat Virtualization clusters have a compatibility version. The cluster compatibility version indicates the features of Red Hat Virtualization supported by all of the hosts in the cluster. The cluster compatibility is set according to the version of the least capable host operating system in the cluster.
Prerequisites
- To change the cluster compatibility level, you must first update all the hosts in your cluster to a level that supports your desired compatibility level. Check if there is an icon next to the host indicating an update is available.
Limitations
Virtio NICs are enumerated as a different device after upgrading the cluster compatibility level to 4.6. Therefore, the NICs might need to be reconfigured. Red Hat recommends that you test the virtual machines before you upgrade the cluster by setting the cluster compatibility level to 4.6 on the virtual machine and verifying the network connection.
If the network connection for the virtual machine fails, configure the virtual machine with a custom emulated machine that matches the current emulated machine, for example pc-q35-rhel8.3.0 for 4.5 compatibility version, before upgrading the cluster.
Procedure
- In the Administration Portal, click → .
- Select the cluster to change and click .
- On the General tab, change the Compatibility Version to the desired value.
- Click . The Change Cluster Compatibility Version confirmation dialog opens.
- Click to confirm.
An error message might warn that some virtual machines and templates are incorrectly configured. To fix this error, edit each virtual machine manually. The Edit Virtual Machine window provides additional validations and warnings that show what to correct. Sometimes the issue is automatically corrected and the virtual machine’s configuration just needs to be saved again. After editing each virtual machine, you will be able to change the cluster compatibility version.
You can now update the cluster compatibility version for virtual machines in the cluster.
3.1.10. Changing Virtual Machine Cluster Compatibility Copy linkLink copied to clipboard!
After updating a cluster’s compatibility version, you must update the cluster compatibility version of all running or suspended virtual machines by rebooting them from the Administration Portal, or using the REST API, or from within the guest operating system. Virtual machines that require a reboot are marked with the pending changes icon (
).
Although you can wait to reboot the virtual machines at a convenient time, rebooting immediately is highly recommended so that the virtual machines use the latest configuration. Any virtual machine that has not been rebooted runs with the previous configuration, and subsequent configuration changes made to the virtual machine might overwrite its pending cluster compatibility changes.
Procedure
- In the Administration Portal, click → .
Check which virtual machines require a reboot. In the Vms: search bar, enter the following query:
next_run_config_exists=True
next_run_config_exists=TrueCopy to Clipboard Copied! Toggle word wrap Toggle overflow The search results show all virtual machines with pending changes.
- Select each virtual machine and click Restart. Alternatively, if necessary you can reboot a virtual machine from within the virtual machine itself.
When the virtual machine starts, the new compatibility version is automatically applied.
You cannot change the cluster compatibility version of a virtual machine snapshot that is in preview. You must first commit or undo the preview.
You can now update the data center compatibility version.
3.1.11. Changing the Data Center Compatibility Version Copy linkLink copied to clipboard!
Red Hat Virtualization data centers have a compatibility version. The compatibility version indicates the version of Red Hat Virtualization with which the data center is intended to be compatible. All clusters in the data center must support the desired compatibility level.
Prerequisites
- To change the data center compatibility level, you must first update the compatibility version of all clusters and virtual machines in the data center.
Procedure
- In the Administration Portal, click → .
- Select the data center to change and click .
- Change the Compatibility Version to the desired value.
- Click . The Change Data Center Compatibility Version confirmation dialog opens.
- Click to confirm.
3.2. Upgrading a Remote Database Environment from Red Hat Virtualization 4.2 to 4.3 Copy linkLink copied to clipboard!
Upgrading your environment from 4.2 to 4.3 involves the following steps:
- Make sure you meet the prerequisites, including enabling the correct repositories
- Use the Log Collection Analysis tool and Image Discrepancies tool to check for issues that might prevent a successful upgrade
- Update the 4.2 Manager to the latest version of 4.2
- Upgrade the database from PostgreSQL 9.5 to 10.0
- Upgrade the Manager from 4.2 to 4.3
- Update the hosts
- Update the compatibility version of the clusters
- Reboot any running or suspended virtual machines to update their configuration
- Update the compatibility version of the data centers
- If you previously upgraded to 4.2 without replacing SHA-1 certificates with SHA-256 certificates, you must replace the certificates now.
3.2.1. Prerequisites Copy linkLink copied to clipboard!
- Plan for any necessary virtual machine downtime. After you update the clusters' compatibility versions during the upgrade, a new hardware configuration is automatically applied to each virtual machine once it reboots. You must reboot any running or suspended virtual machines as soon as possible to apply the configuration changes.
- Ensure your environment meets the requirements for Red Hat Virtualization 4.4. For a complete list of prerequisites, see the Planning and Prerequisites Guide.
- When upgrading Red Hat Virtualization Manager, it is recommended that you use one of the existing hosts. If you decide to use a new host, you must assign a unique name to the new host and then add it to the existing cluster before you begin the upgrade procedure.
3.2.2. Analyzing the Environment Copy linkLink copied to clipboard!
It is recommended to run the Log Collection Analysis tool and the Image Discrepancies tool prior to performing updates and for troubleshooting. These tools analyze your environment for known issues that might prevent you from performing an update, and provide recommendations to resolve them.
3.2.3. Log Collection Analysis tool Copy linkLink copied to clipboard!
Run the Log Collection Analysis tool prior to performing updates and for troubleshooting. The tool analyzes your environment for known issues that might prevent you from performing an update, and provides recommendations to resolve them. The tool gathers detailed information about your system and presents it as an HTML file.
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.2.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
Install the Log Collection Analysis tool on the Manager machine:
yum install rhv-log-collector-analyzer
# yum install rhv-log-collector-analyzerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run the tool:
rhv-log-collector-analyzer --live
# rhv-log-collector-analyzer --liveCopy to Clipboard Copied! Toggle word wrap Toggle overflow A detailed report is displayed.
By default, the report is saved to a file called
analyzer_report.html.To save the file to a specific location, use the
--htmlflag and specify the location:rhv-log-collector-analyzer --live --html=/directory/filename.html
# rhv-log-collector-analyzer --live --html=/directory/filename.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow You can use the ELinks text mode web browser to read the analyzer reports within the terminal. To install the ELinks browser:
yum install -y elinks
# yum install -y elinksCopy to Clipboard Copied! Toggle word wrap Toggle overflow Launch ELinks and open
analyzer_report.html.elinks /home/user1/analyzer_report.html
# elinks /home/user1/analyzer_report.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow To navigate the report, use the following commands in ELinks:
-
Insertto scroll up -
Deleteto scroll down -
PageUpto page up -
PageDownto page down -
Left Bracketto scroll left -
Right Bracketto scroll right
-
3.2.3.1. Monitoring snapshot health with the image discrepancies tool Copy linkLink copied to clipboard!
The RHV Image Discrepancies tool analyzes image data in the Storage Domain and RHV Database. It alerts you if it finds discrepancies in volumes and volume attributes, but does not fix those discrepancies. Use this tool in a variety of scenarios, such as:
- Before upgrading versions, to avoid carrying over broken volumes or chains to the new version.
- Following a failed storage operation, to detect volumes or attributes in a bad state.
- After restoring the RHV database or storage from backup.
- Periodically, to detect potential problems before they worsen.
- To analyze a snapshot- or live storage migration-related issues, and to verify system health after fixing these types of problems.
Prerequisites
-
Required Versions: this tool was introduced in RHV version 4.3.8 with
rhv-log-collector-analyzer-0.2.15-0.el7ev. - Because data collection runs simultaneously at different places and is not atomic, stop all activity in the environment that can modify the storage domains. That is, do not create or remove snapshots, edit, move, create, or remove disks. Otherwise, false detection of inconsistencies may occur. Virtual Machines can remain running normally during the process.
Procedure
To run the tool, enter the following command on the RHV Manager:
rhv-image-discrepancies
# rhv-image-discrepanciesCopy to Clipboard Copied! Toggle word wrap Toggle overflow - If the tool finds discrepancies, rerun it to confirm the results, especially if there is a chance some operations were performed while the tool was running.
This tool includes any Export and ISO storage domains and may report discrepancies for them. If so, these can be ignored, as these storage domains do not have entries for images in the RHV database.
Understanding the results
The tool reports the following:
- If there are volumes that appear on the storage but are not in the database, or appear in the database but are not on the storage.
- If some volume attributes differ between the storage and the database.
Sample output:
You can now update the Manager to the latest version of 4.2.
3.2.4. Updating the Red Hat Virtualization Manager Copy linkLink copied to clipboard!
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.2.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
On the Manager machine, check if updated packages are available:
engine-upgrade-check
# engine-upgrade-checkCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the setup packages:
yum update ovirt\*setup\* rh\*vm-setup-plugins
# yum update ovirt\*setup\* rh\*vm-setup-pluginsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the Red Hat Virtualization Manager with the
engine-setupscript. Theengine-setupscript prompts you with some configuration questions, then stops theovirt-engineservice, downloads and installs the updated packages, backs up and updates the database, performs post-installation configuration, and starts theovirt-engineservice.engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow When the script completes successfully, the following message appears:
Execution of setup completed successfully
Execution of setup completed successfullyCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe
engine-setupscript is also used during the Red Hat Virtualization Manager installation process, and it stores the configuration values supplied. During an update, the stored values are displayed when previewing the configuration, and might not be up to date ifengine-configwas used to update configuration after installation. For example, ifengine-configwas used to updateSANWipeAfterDeletetotrueafter installation,engine-setupwill output "Default SAN wipe after delete: False" in the configuration preview. However, the updated values will not be overwritten byengine-setup.ImportantThe update process might take some time. Do not stop the process before it completes.
Update the base operating system and any optional packages installed on the Manager:
yum update --nobest
# yum update --nobestCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantIf you encounter a required Ansible package conflict during the update, see Cannot perform yum update on my RHV manager (ansible conflict).
ImportantIf any kernel packages were updated, reboot the machine to complete the update.
3.2.5. Upgrading remote databases from PostgreSQL 9.5 to 10 Copy linkLink copied to clipboard!
Red Hat Virtualization 4.3 uses PostgreSQL 10 instead of PostgreSQL 9.5. If your databases are installed locally, the upgrade script automatically upgrades them from version 9.5 to 10. However, if either of your databases (Manager or Data Warehouse) is installed on a separate machine, you must perform the following procedure on each remote database before upgrading the Manager.
Stop the service running on the machine:
When upgrading the Manager database, stop the
ovirt-engineservice on the Manager machine:systemctl stop ovirt-engine
# systemctl stop ovirt-engineCopy to Clipboard Copied! Toggle word wrap Toggle overflow When upgrading the Data Warehouse database, stop the
ovirt-engine-dwhdservice on the Data Warehouse machine:systemctl stop ovirt-engine-dwhd
# systemctl stop ovirt-engine-dwhdCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Enable the required repository to receive the PostgreSQL 10 package:
Enable either the Red Hat Virtualization Manager repository:
subscription-manager repos --enable=rhel-7-server-rhv-4.3-manager-rpms
# subscription-manager repos --enable=rhel-7-server-rhv-4.3-manager-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow or the SCL repository:
subscription-manager repos --enable rhel-server-rhscl-7-rpms
# subscription-manager repos --enable rhel-server-rhscl-7-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Install the PostgreSQL 10 packages:
yum install rh-postgresql10 rh-postgresql10-postgresql-contrib
# yum install rh-postgresql10 rh-postgresql10-postgresql-contribCopy to Clipboard Copied! Toggle word wrap Toggle overflow Stop and disable the PostgreSQL 9.5 service:
systemctl stop rh-postgresql95-postgresql systemctl disable rh-postgresql95-postgresql
# systemctl stop rh-postgresql95-postgresql # systemctl disable rh-postgresql95-postgresqlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Upgrade the PostgreSQL 9.5 database to PostgreSQL 10:
scl enable rh-postgresql10 -- postgresql-setup --upgrade-from=rh-postgresql95-postgresql --upgrade
# scl enable rh-postgresql10 -- postgresql-setup --upgrade-from=rh-postgresql95-postgresql --upgradeCopy to Clipboard Copied! Toggle word wrap Toggle overflow Start and enable the
rh-postgresql10-postgresql.serviceand check that it is running:systemctl start rh-postgresql10-postgresql.service systemctl enable rh-postgresql10-postgresql.service systemctl status rh-postgresql10-postgresql.service
# systemctl start rh-postgresql10-postgresql.service # systemctl enable rh-postgresql10-postgresql.service # systemctl status rh-postgresql10-postgresql.serviceCopy to Clipboard Copied! Toggle word wrap Toggle overflow Ensure that you see output similar to the following:
rh-postgresql10-postgresql.service - PostgreSQL database server Loaded: loaded (/usr/lib/systemd/system/rh-postgresql10-postgresql.service; enabled; vendor preset: disabled) Active: active (running) since ...
rh-postgresql10-postgresql.service - PostgreSQL database server Loaded: loaded (/usr/lib/systemd/system/rh-postgresql10-postgresql.service; enabled; vendor preset: disabled) Active: active (running) since ...Copy to Clipboard Copied! Toggle word wrap Toggle overflow Copy the
pg_hba.confclient configuration file from the PostgreSQL 9.5 environment to the PostgreSQL 10 environment:cp -p /var/opt/rh/rh-postgresql95/lib/pgsql/data/pg_hba.conf /var/opt/rh/rh-postgresql10/lib/pgsql/data/pg_hba.conf
# cp -p /var/opt/rh/rh-postgresql95/lib/pgsql/data/pg_hba.conf /var/opt/rh/rh-postgresql10/lib/pgsql/data/pg_hba.confCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the following parameters in
/var/opt/rh/rh-postgresql10/lib/pgsql/data/postgresql.conf:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Restart the PostgreSQL 10 service to apply the configuration changes:
systemctl restart rh-postgresql10-postgresql.service
# systemctl restart rh-postgresql10-postgresql.serviceCopy to Clipboard Copied! Toggle word wrap Toggle overflow
You can now upgrade the Manager to 4.3.
3.2.6. Upgrading the Red Hat Virtualization Manager from 4.2 to 4.3 Copy linkLink copied to clipboard!
Follow these same steps when upgrading any of the following:
- the Red Hat Virtualization Manager
- a remote machine with the Data Warehouse service
You need to be logged into the machine that you are upgrading.
If the upgrade fails, the engine-setup command attempts to restore your Red Hat Virtualization Manager installation to its previous state. For this reason, do not remove the previous version’s repositories until after the upgrade is complete. If the upgrade fails, the engine-setup script explains how to restore your installation.
Procedure
Enable the Red Hat Virtualization 4.3 repositories:
subscription-manager repos \ --enable=rhel-7-server-rhv-4.3-manager-rpms \ --enable=jb-eap-7.2-for-rhel-7-server-rpms# subscription-manager repos \ --enable=rhel-7-server-rhv-4.3-manager-rpms \ --enable=jb-eap-7.2-for-rhel-7-server-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow All other repositories remain the same across Red Hat Virtualization releases.
Update the setup packages:
yum update ovirt\*setup\* rh\*vm-setup-plugins
# yum update ovirt\*setup\* rh\*vm-setup-pluginsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run
engine-setupand follow the prompts to upgrade the Red Hat Virtualization Manager, the remote database or remote service:engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteDuring the upgrade process for the Manager, the
engine-setupscript might prompt you to disconnect the remote Data Warehouse database. You must disconnect it to continue the setup.When the script completes successfully, the following message appears:
Execution of setup completed successfully
Execution of setup completed successfullyCopy to Clipboard Copied! Toggle word wrap Toggle overflow Disable the Red Hat Virtualization 4.2 repositories to ensure the system does not use any 4.2 packages:
subscription-manager repos \ --disable=rhel-7-server-rhv-4.2-manager-rpms \ --disable=jb-eap-7-for-rhel-7-server-rpms# subscription-manager repos \ --disable=rhel-7-server-rhv-4.2-manager-rpms \ --disable=jb-eap-7-for-rhel-7-server-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the base operating system:
yum update
# yum updateCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantIf you encounter a required Ansible package conflict during the update, see Cannot perform yum update on my RHV manager (ansible conflict).
ImportantIf any kernel packages were updated, reboot the machine to complete the upgrade.
The Manager is now upgraded to version 4.3.
3.2.6.1. Completing the remote Data Warehouse database upgrade Copy linkLink copied to clipboard!
Complete these additional steps when upgrading a remote Data Warehouse database from PostgreSQL 9.5 to 10.
Procedure
The
ovirt-engine-dwhdservice is now running on the Manager machine. If theovirt-engine-dwhdservice is on a remote machine, stop and disable theovirt-engine-dwhdservice on the Manager machine, and remove the configuration files thatengine-setupcreated:systemctl stop ovirt-engine-dwhd systemctl disable ovirt-engine-dwhd rm -f /etc/ovirt-engine-dwh/ovirt-engine-dwhd.conf.d/*
# systemctl stop ovirt-engine-dwhd # systemctl disable ovirt-engine-dwhd # rm -f /etc/ovirt-engine-dwh/ovirt-engine-dwhd.conf.d/*Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Repeat the steps in Upgrading the Manager to 4.3 on the machine hosting the
ovirt-engine-dwhdservice.
You can now update the hosts.
3.2.7. Updating All Hosts in a Cluster Copy linkLink copied to clipboard!
You can update all hosts in a cluster instead of updating hosts individually. This is particularly useful during upgrades to new versions of Red Hat Virtualization. See oVirt Cluster Upgrade for more information about the Ansible role used to automate the updates.
Update one cluster at a time.
Limitations
-
On RHVH, the update only preserves modified content in the
/etcand/vardirectories. Modified data in other paths is overwritten during an update. - If the cluster has migration enabled, virtual machines are automatically migrated to another host in the cluster.
- In a self-hosted engine environment, the Manager virtual machine can only migrate between self-hosted engine nodes in the same cluster. It cannot migrate to standard hosts.
- The cluster must have sufficient memory reserved for its hosts to perform maintenance. Otherwise, virtual machine migrations will hang and fail. You can reduce the memory usage of host updates by shutting down some or all virtual machines before updating hosts.
- You cannot migrate a pinned virtual machine (such as a virtual machine using a vGPU) to another host. Pinned virtual machines are shut down during the update, unless you choose to skip that host instead.
Procedure
- In the Administration Portal, click → and select the cluster. The Upgrade status column shows if an upgrade is available for any hosts in the cluster.
- Click Upgrade.
- Select the hosts to update, then click Next.
Configure the options:
- Stop Pinned VMs shuts down any virtual machines that are pinned to hosts in the cluster, and is selected by default. You can clear this check box to skip updating those hosts so that the pinned virtual machines stay running, such as when a pinned virtual machine is running important services or processes and you do not want it to shut down at an unknown time during the update.
-
Upgrade Timeout (Minutes) sets the time to wait for an individual host to be updated before the cluster upgrade fails with a timeout. The default is
60. You can increase it for large clusters where 60 minutes might not be enough, or reduce it for small clusters where the hosts update quickly. - Check Upgrade checks each host for available updates before running the upgrade process. It is not selected by default, but you can select it if you need to ensure that recent updates are included, such as when you have configured the Manager to check for host updates less frequently than the default.
- Reboot After Upgrade reboots each host after it is updated, and is selected by default. You can clear this check box to speed up the process if you are sure that there are no pending updates that require a host reboot.
-
Use Maintenance Policy sets the cluster’s scheduling policy to
cluster_maintenanceduring the update. It is selected by default, so activity is limited and virtual machines cannot start unless they are highly available. You can clear this check box if you have a custom scheduling policy that you want to keep using during the update, but this could have unknown consequences. Ensure your custom policy is compatible with cluster upgrade activity before disabling this option.
- Click Next.
- Review the summary of the hosts and virtual machines that will be affected.
- Click Upgrade.
You can track the progress of host updates:
- in the → view, the Upgrade Status column shows Upgrade in progress.
- in the → view
-
in the Events section of the Notification Drawer (
).
You can track the progress of individual virtual machine migrations in the Status column of the → view. In large environments, you may need to filter the results to show a particular group of virtual machines.
3.2.8. Changing the Cluster Compatibility Version Copy linkLink copied to clipboard!
Red Hat Virtualization clusters have a compatibility version. The cluster compatibility version indicates the features of Red Hat Virtualization supported by all of the hosts in the cluster. The cluster compatibility is set according to the version of the least capable host operating system in the cluster.
Prerequisites
- To change the cluster compatibility level, you must first update all the hosts in your cluster to a level that supports your desired compatibility level. Check if there is an icon next to the host indicating an update is available.
Limitations
Virtio NICs are enumerated as a different device after upgrading the cluster compatibility level to 4.6. Therefore, the NICs might need to be reconfigured. Red Hat recommends that you test the virtual machines before you upgrade the cluster by setting the cluster compatibility level to 4.6 on the virtual machine and verifying the network connection.
If the network connection for the virtual machine fails, configure the virtual machine with a custom emulated machine that matches the current emulated machine, for example pc-q35-rhel8.3.0 for 4.5 compatibility version, before upgrading the cluster.
Procedure
- In the Administration Portal, click → .
- Select the cluster to change and click .
- On the General tab, change the Compatibility Version to the desired value.
- Click . The Change Cluster Compatibility Version confirmation dialog opens.
- Click to confirm.
An error message might warn that some virtual machines and templates are incorrectly configured. To fix this error, edit each virtual machine manually. The Edit Virtual Machine window provides additional validations and warnings that show what to correct. Sometimes the issue is automatically corrected and the virtual machine’s configuration just needs to be saved again. After editing each virtual machine, you will be able to change the cluster compatibility version.
3.2.9. Changing Virtual Machine Cluster Compatibility Copy linkLink copied to clipboard!
After updating a cluster’s compatibility version, you must update the cluster compatibility version of all running or suspended virtual machines by rebooting them from the Administration Portal, or using the REST API, or from within the guest operating system. Virtual machines that require a reboot are marked with the pending changes icon (
).
Although you can wait to reboot the virtual machines at a convenient time, rebooting immediately is highly recommended so that the virtual machines use the latest configuration. Any virtual machine that has not been rebooted runs with the previous configuration, and subsequent configuration changes made to the virtual machine might overwrite its pending cluster compatibility changes.
Procedure
- In the Administration Portal, click → .
Check which virtual machines require a reboot. In the Vms: search bar, enter the following query:
next_run_config_exists=True
next_run_config_exists=TrueCopy to Clipboard Copied! Toggle word wrap Toggle overflow The search results show all virtual machines with pending changes.
- Select each virtual machine and click Restart. Alternatively, if necessary you can reboot a virtual machine from within the virtual machine itself.
When the virtual machine starts, the new compatibility version is automatically applied.
You cannot change the cluster compatibility version of a virtual machine snapshot that is in preview. You must first commit or undo the preview.
3.2.10. Changing the Data Center Compatibility Version Copy linkLink copied to clipboard!
Red Hat Virtualization data centers have a compatibility version. The compatibility version indicates the version of Red Hat Virtualization with which the data center is intended to be compatible. All clusters in the data center must support the desired compatibility level.
Prerequisites
- To change the data center compatibility level, you must first update the compatibility version of all clusters and virtual machines in the data center.
Procedure
- In the Administration Portal, click → .
- Select the data center to change and click .
- Change the Compatibility Version to the desired value.
- Click . The Change Data Center Compatibility Version confirmation dialog opens.
- Click to confirm.
If you previously upgraded to 4.2 without replacing SHA-1 certificates with SHA-256 certificates, you must do so now.
3.2.11. Replacing SHA-1 Certificates with SHA-256 Certificates Copy linkLink copied to clipboard!
Red Hat Virtualization 4.4 uses SHA-256 signatures, which provide a more secure way to sign SSL certificates than SHA-1. Newly installed systems do not require any special steps to enable Red Hat Virtualization’s public key infrastructure (PKI) to use SHA-256 signatures.
Do NOT let certificates expire. If they expire, the environment becomes non-responsive and recovery is an error prone and time consuming process. For information on renewing certificates, see Renewing certificates before they expire in the Administration Guide.
Preventing Warning Messages from Appearing in the Browser
- Log in to the Manager machine as the root user.
Check whether /etc/pki/ovirt-engine/openssl.conf includes the line
default_md = sha256:cat /etc/pki/ovirt-engine/openssl.conf
# cat /etc/pki/ovirt-engine/openssl.confCopy to Clipboard Copied! Toggle word wrap Toggle overflow If it still includes
default_md = sha1, back up the existing configuration and change the default tosha256:cp -p /etc/pki/ovirt-engine/openssl.conf /etc/pki/ovirt-engine/openssl.conf."$(date +"%Y%m%d%H%M%S")" sed -i 's/^default_md = sha1/default_md = sha256/' /etc/pki/ovirt-engine/openssl.conf
# cp -p /etc/pki/ovirt-engine/openssl.conf /etc/pki/ovirt-engine/openssl.conf."$(date +"%Y%m%d%H%M%S")" # sed -i 's/^default_md = sha1/default_md = sha256/' /etc/pki/ovirt-engine/openssl.confCopy to Clipboard Copied! Toggle word wrap Toggle overflow Define the certificate that should be re-signed:
names="apache"
# names="apache"Copy to Clipboard Copied! Toggle word wrap Toggle overflow On the Manager, save a backup of the
/etc/ovirt-engine/engine.conf.dand/etc/pki/ovirt-enginedirectories, and re-sign the certificates:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Do not change this the password value.
Restart the httpd service:
systemctl restart httpd
# systemctl restart httpdCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Connect to the Administration Portal to confirm that the warning no longer appears.
-
If you previously imported a CA or https certificate into the browser, find the certificate(s), remove them from the browser, and reimport the new CA certificate. Install the certificate authority according to the instructions provided by your browser. To get the certificate authority’s certificate, navigate to
http://your-manager-fqdn/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA, replacing your-manager-fqdn with the fully qualified domain name (FQDN).
Replacing All Signed Certificates with SHA-256
- Log in to the Manager machine as the root user.
Check whether /etc/pki/ovirt-engine/openssl.conf includes the line
default_md = sha256:cat /etc/pki/ovirt-engine/openssl.conf
# cat /etc/pki/ovirt-engine/openssl.confCopy to Clipboard Copied! Toggle word wrap Toggle overflow If it still includes
default_md = sha1, back up the existing configuration and change the default tosha256:cp -p /etc/pki/ovirt-engine/openssl.conf /etc/pki/ovirt-engine/openssl.conf."$(date +"%Y%m%d%H%M%S")" sed -i 's/^default_md = sha1/default_md = sha256/' /etc/pki/ovirt-engine/openssl.conf
# cp -p /etc/pki/ovirt-engine/openssl.conf /etc/pki/ovirt-engine/openssl.conf."$(date +"%Y%m%d%H%M%S")" # sed -i 's/^default_md = sha1/default_md = sha256/' /etc/pki/ovirt-engine/openssl.confCopy to Clipboard Copied! Toggle word wrap Toggle overflow Re-sign the CA certificate by backing it up and creating a new certificate in ca.pem.new:
cp -p /etc/pki/ovirt-engine/private/ca.pem /etc/pki/ovirt-engine/private/ca.pem."$(date +"%Y%m%d%H%M%S")" openssl x509 -signkey /etc/pki/ovirt-engine/private/ca.pem -in /etc/pki/ovirt-engine/ca.pem -out /etc/pki/ovirt-engine/ca.pem.new -days 3650 -sha256
# cp -p /etc/pki/ovirt-engine/private/ca.pem /etc/pki/ovirt-engine/private/ca.pem."$(date +"%Y%m%d%H%M%S")" # openssl x509 -signkey /etc/pki/ovirt-engine/private/ca.pem -in /etc/pki/ovirt-engine/ca.pem -out /etc/pki/ovirt-engine/ca.pem.new -days 3650 -sha256Copy to Clipboard Copied! Toggle word wrap Toggle overflow Replace the existing certificate with the new certificate:
mv /etc/pki/ovirt-engine/ca.pem.new /etc/pki/ovirt-engine/ca.pem
# mv /etc/pki/ovirt-engine/ca.pem.new /etc/pki/ovirt-engine/ca.pemCopy to Clipboard Copied! Toggle word wrap Toggle overflow Define the certificates that should be re-signed:
names="engine apache websocket-proxy jboss imageio-proxy"
# names="engine apache websocket-proxy jboss imageio-proxy"Copy to Clipboard Copied! Toggle word wrap Toggle overflow If you replaced the Red Hat Virtualization Manager SSL Certificate after the upgrade, run the following instead:
names="engine websocket-proxy jboss imageio-proxy"
# names="engine websocket-proxy jboss imageio-proxy"Copy to Clipboard Copied! Toggle word wrap Toggle overflow For more details see Replacing the Red Hat Virtualization Manager CA Certificate in the Administration Guide.
On the Manager, save a backup of the
/etc/ovirt-engine/engine.conf.dand/etc/pki/ovirt-enginedirectories, and re-sign the certificates:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Do not change this the password value.
Restart the following services:
systemctl restart httpd systemctl restart ovirt-engine systemctl restart ovirt-websocket-proxy systemctl restart ovirt-imageio
# systemctl restart httpd # systemctl restart ovirt-engine # systemctl restart ovirt-websocket-proxy # systemctl restart ovirt-imageioCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Connect to the Administration Portal to confirm that the warning no longer appears.
-
If you previously imported a CA or https certificate into the browser, find the certificate(s), remove them from the browser, and reimport the new CA certificate. Install the certificate authority according to the instructions provided by your browser. To get the certificate authority’s certificate, navigate to
http://your-manager-fqdn/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA, replacing your-manager-fqdn with the fully qualified domain name (FQDN). Enroll the certificates on the hosts. Repeat the following procedure for each host.
- In the Administration Portal, click → .
- Select the host and click → and .
- Once the host is in maintenance mode, click → .
- Click → .
Chapter 4. Updates between minor releases Copy linkLink copied to clipboard!
4.1. Updating Red Hat Virtualization between minor releases Copy linkLink copied to clipboard!
To update from your current version of 4.4 to the latest version of 4.4, update the Manager, update the hosts, and then change the compatibility version for the cluster, virtual machines, and data center.
If upgrading from version 4.4.9 to a later version fails on RHVH, run the dnf reinstall redhat-virtualization-host-image-update command to fix the issue.
Upgrade Considerations
- When planning to upgrade, see Red Hat Virtualization 4.4 upgrade considerations and known issues.
When upgrading from Open Virtual Network (OVN) and Open vSwitch (OvS) 2.11 to OVN 2021 and OvS 2.15, the process is transparent to the user as long as the following conditions are met:
- The Manager is upgraded first.
- The ovirt-provider-ovn security groups must be disabled, before the host upgrade, for all OVN networks that are expected to work between hosts with OVN/OvS version 2.11.
- The hosts are upgraded to match OVN version 2021 or higher and OvS version 2.15. You must complete this step in the Administration Portal, so you can properly reconfigure OVN and refresh the certificates.
- The host is rebooted after an upgrade.
To verify whether the provider and OVN were configured successfully on the host, check the OVN configured flag on the General tab for the host. If the OVN Configured is set to No, click → . This setting is also available in the REST API. If refreshing the capabilities fails, you can configure OVN by reinstalling the host from Manager 4.4 or higher.
4.1.1. Analyzing the Environment Copy linkLink copied to clipboard!
It is recommended to run the Log Collection Analysis tool and the Image Discrepancies tool prior to performing updates and for troubleshooting. These tools analyze your environment for known issues that might prevent you from performing an update, and provide recommendations to resolve them.
4.1.2. Log Collection Analysis tool Copy linkLink copied to clipboard!
Run the Log Collection Analysis tool prior to performing updates and for troubleshooting. The tool analyzes your environment for known issues that might prevent you from performing an update, and provides recommendations to resolve them. The tool gathers detailed information about your system and presents it as an HTML file.
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.4.
Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
Install the Log Collection Analysis tool on the Manager machine:
yum install rhv-log-collector-analyzer
# yum install rhv-log-collector-analyzerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run the tool:
rhv-log-collector-analyzer --live
# rhv-log-collector-analyzer --liveCopy to Clipboard Copied! Toggle word wrap Toggle overflow A detailed report is displayed.
By default, the report is saved to a file called
analyzer_report.html.To save the file to a specific location, use the
--htmlflag and specify the location:rhv-log-collector-analyzer --live --html=/directory/filename.html
# rhv-log-collector-analyzer --live --html=/directory/filename.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow You can use the ELinks text mode web browser to read the analyzer reports within the terminal. To install the ELinks browser:
yum install -y elinks
# yum install -y elinksCopy to Clipboard Copied! Toggle word wrap Toggle overflow Launch ELinks and open
analyzer_report.html.elinks /home/user1/analyzer_report.html
# elinks /home/user1/analyzer_report.htmlCopy to Clipboard Copied! Toggle word wrap Toggle overflow To navigate the report, use the following commands in ELinks:
-
Insertto scroll up -
Deleteto scroll down -
PageUpto page up -
PageDownto page down -
Left Bracketto scroll left -
Right Bracketto scroll right
-
4.1.2.1. Monitoring snapshot health with the image discrepancies tool Copy linkLink copied to clipboard!
The RHV Image Discrepancies tool analyzes image data in the Storage Domain and RHV Database. It alerts you if it finds discrepancies in volumes and volume attributes, but does not fix those discrepancies. Use this tool in a variety of scenarios, such as:
- Before upgrading versions, to avoid carrying over broken volumes or chains to the new version.
- Following a failed storage operation, to detect volumes or attributes in a bad state.
- After restoring the RHV database or storage from backup.
- Periodically, to detect potential problems before they worsen.
- To analyze a snapshot- or live storage migration-related issues, and to verify system health after fixing these types of problems.
Prerequisites
-
Required Versions: this tool was introduced in RHV version 4.3.8 with
rhv-log-collector-analyzer-0.2.15-0.el7ev. - Because data collection runs simultaneously at different places and is not atomic, stop all activity in the environment that can modify the storage domains. That is, do not create or remove snapshots, edit, move, create, or remove disks. Otherwise, false detection of inconsistencies may occur. Virtual Machines can remain running normally during the process.
Procedure
To run the tool, enter the following command on the RHV Manager:
rhv-image-discrepancies
# rhv-image-discrepanciesCopy to Clipboard Copied! Toggle word wrap Toggle overflow - If the tool finds discrepancies, rerun it to confirm the results, especially if there is a chance some operations were performed while the tool was running.
This tool includes any Export and ISO storage domains and may report discrepancies for them. If so, these can be ignored, as these storage domains do not have entries for images in the RHV database.
Understanding the results
The tool reports the following:
- If there are volumes that appear on the storage but are not in the database, or appear in the database but are not on the storage.
- If some volume attributes differ between the storage and the database.
Sample output:
To update a standalone Manager, follow the standard procedure for minor updates:
4.1.3. Updating the Red Hat Virtualization Manager Copy linkLink copied to clipboard!
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.4.
NoteIf you are upgrading from RHV version 4.4.0 through 4.4.8 to RHV version 4.4.9 or later, you must add the EAP 7.4 channel to the list of subscription repositories
jb-eap-7.4-for-rhel-8-x86_64-rpms, and following the upgrade, remove thejb-eap-7.3-for-rhel-8-x86_64-rpmsfrom the lisat of subscription repositories.Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
On the Manager machine, check if updated packages are available:
engine-upgrade-check
# engine-upgrade-checkCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the setup packages:
yum update ovirt\*setup\* rh\*vm-setup-plugins
# yum update ovirt\*setup\* rh\*vm-setup-pluginsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the Red Hat Virtualization Manager with the
engine-setupscript. Theengine-setupscript prompts you with some configuration questions, then stops theovirt-engineservice, downloads and installs the updated packages, backs up and updates the database, performs post-installation configuration, and starts theovirt-engineservice.engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow When the script completes successfully, the following message appears:
Execution of setup completed successfully
Execution of setup completed successfullyCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe
engine-setupscript is also used during the Red Hat Virtualization Manager installation process, and it stores the configuration values supplied. During an update, the stored values are displayed when previewing the configuration, and might not be up to date ifengine-configwas used to update configuration after installation. For example, ifengine-configwas used to updateSANWipeAfterDeletetotrueafter installation,engine-setupwill output "Default SAN wipe after delete: False" in the configuration preview. However, the updated values will not be overwritten byengine-setup.ImportantThe update process might take some time. Do not stop the process before it completes.
Update the base operating system and any optional packages installed on the Manager:
yum update --nobest
# yum update --nobestCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantIf you encounter a required Ansible package conflict during the update, see Cannot perform yum update on my RHV manager (ansible conflict).
ImportantIf any kernel packages were updated, reboot the machine to complete the update.
4.1.4. Updating a Self-Hosted Engine Copy linkLink copied to clipboard!
To update a self-hosted engine from your current version to the latest version, you must place the environment in global maintenance mode and then follow the standard procedure for updating between minor versions.
Enabling global maintenance mode
You must place the self-hosted engine environment in global maintenance mode before performing any setup or upgrade tasks on the Manager virtual machine.
Procedure
Log in to one of the self-hosted engine nodes and enable global maintenance mode:
hosted-engine --set-maintenance --mode=global
# hosted-engine --set-maintenance --mode=globalCopy to Clipboard Copied! Toggle word wrap Toggle overflow Confirm that the environment is in global maintenance mode before proceeding:
hosted-engine --vm-status
# hosted-engine --vm-statusCopy to Clipboard Copied! Toggle word wrap Toggle overflow You should see a message indicating that the cluster is in global maintenance mode.
Updating the Red Hat Virtualization Manager
Prerequisites
Ensure the Manager has the correct repositories enabled. For the list of required repositories, see Enabling the Red Hat Virtualization Manager Repositories for Red Hat Virtualization 4.4.
NoteIf you are upgrading from RHV version 4.4.0 through 4.4.8 to RHV version 4.4.9 or later, you must add the EAP 7.4 channel to the list of subscription repositories
jb-eap-7.4-for-rhel-8-x86_64-rpms, and following the upgrade, remove thejb-eap-7.3-for-rhel-8-x86_64-rpmsfrom the lisat of subscription repositories.Updates to the Red Hat Virtualization Manager are released through the Content Delivery Network.
Procedure
On the Manager machine, check if updated packages are available:
engine-upgrade-check
# engine-upgrade-checkCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the setup packages:
yum update ovirt\*setup\* rh\*vm-setup-plugins
# yum update ovirt\*setup\* rh\*vm-setup-pluginsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the Red Hat Virtualization Manager with the
engine-setupscript. Theengine-setupscript prompts you with some configuration questions, then stops theovirt-engineservice, downloads and installs the updated packages, backs up and updates the database, performs post-installation configuration, and starts theovirt-engineservice.engine-setup
# engine-setupCopy to Clipboard Copied! Toggle word wrap Toggle overflow When the script completes successfully, the following message appears:
Execution of setup completed successfully
Execution of setup completed successfullyCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe
engine-setupscript is also used during the Red Hat Virtualization Manager installation process, and it stores the configuration values supplied. During an update, the stored values are displayed when previewing the configuration, and might not be up to date ifengine-configwas used to update configuration after installation. For example, ifengine-configwas used to updateSANWipeAfterDeletetotrueafter installation,engine-setupwill output "Default SAN wipe after delete: False" in the configuration preview. However, the updated values will not be overwritten byengine-setup.ImportantThe update process might take some time. Do not stop the process before it completes.
Update the base operating system and any optional packages installed on the Manager:
yum update --nobest
# yum update --nobestCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantIf you encounter a required Ansible package conflict during the update, see Cannot perform yum update on my RHV manager (ansible conflict).
ImportantIf any kernel packages were updated:
- Disable global maintenance mode
- Reboot the machine to complete the update.
Related Information
Disabling global maintenance mode
Procedure
- Log in to the Manager virtual machine and shut it down.
Log in to one of the self-hosted engine nodes and disable global maintenance mode:
hosted-engine --set-maintenance --mode=none
# hosted-engine --set-maintenance --mode=noneCopy to Clipboard Copied! Toggle word wrap Toggle overflow When you exit global maintenance mode, ovirt-ha-agent starts the Manager virtual machine, and then the Manager automatically starts. It can take up to ten minutes for the Manager to start.
Confirm that the environment is running:
hosted-engine --vm-status
# hosted-engine --vm-statusCopy to Clipboard Copied! Toggle word wrap Toggle overflow The listed information includes Engine Status. The value for Engine status should be:
{"health": "good", "vm": "up", "detail": "Up"}{"health": "good", "vm": "up", "detail": "Up"}Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteWhen the virtual machine is still booting and the Manager hasn’t started yet, the Engine status is:
{"reason": "bad vm status", "health": "bad", "vm": "up", "detail": "Powering up"}{"reason": "bad vm status", "health": "bad", "vm": "up", "detail": "Powering up"}Copy to Clipboard Copied! Toggle word wrap Toggle overflow If this happens, wait a few minutes and try again.
4.1.5. Updating All Hosts in a Cluster Copy linkLink copied to clipboard!
You can update all hosts in a cluster instead of updating hosts individually. This is particularly useful during upgrades to new versions of Red Hat Virtualization. See oVirt Cluster Upgrade for more information about the Ansible role used to automate the updates.
Update one cluster at a time.
Limitations
-
On RHVH, the update only preserves modified content in the
/etcand/vardirectories. Modified data in other paths is overwritten during an update. - If the cluster has migration enabled, virtual machines are automatically migrated to another host in the cluster.
- In a self-hosted engine environment, the Manager virtual machine can only migrate between self-hosted engine nodes in the same cluster. It cannot migrate to standard hosts.
- The cluster must have sufficient memory reserved for its hosts to perform maintenance. Otherwise, virtual machine migrations will hang and fail. You can reduce the memory usage of host updates by shutting down some or all virtual machines before updating hosts.
- You cannot migrate a pinned virtual machine (such as a virtual machine using a vGPU) to another host. Pinned virtual machines are shut down during the update, unless you choose to skip that host instead.
Procedure
- In the Administration Portal, click → and select the cluster. The Upgrade status column shows if an upgrade is available for any hosts in the cluster.
- Click Upgrade.
- Select the hosts to update, then click Next.
Configure the options:
- Stop Pinned VMs shuts down any virtual machines that are pinned to hosts in the cluster, and is selected by default. You can clear this check box to skip updating those hosts so that the pinned virtual machines stay running, such as when a pinned virtual machine is running important services or processes and you do not want it to shut down at an unknown time during the update.
-
Upgrade Timeout (Minutes) sets the time to wait for an individual host to be updated before the cluster upgrade fails with a timeout. The default is
60. You can increase it for large clusters where 60 minutes might not be enough, or reduce it for small clusters where the hosts update quickly. - Check Upgrade checks each host for available updates before running the upgrade process. It is not selected by default, but you can select it if you need to ensure that recent updates are included, such as when you have configured the Manager to check for host updates less frequently than the default.
- Reboot After Upgrade reboots each host after it is updated, and is selected by default. You can clear this check box to speed up the process if you are sure that there are no pending updates that require a host reboot.
-
Use Maintenance Policy sets the cluster’s scheduling policy to
cluster_maintenanceduring the update. It is selected by default, so activity is limited and virtual machines cannot start unless they are highly available. You can clear this check box if you have a custom scheduling policy that you want to keep using during the update, but this could have unknown consequences. Ensure your custom policy is compatible with cluster upgrade activity before disabling this option.
- Click Next.
- Review the summary of the hosts and virtual machines that will be affected.
- Click Upgrade.
You can track the progress of host updates:
- in the → view, the Upgrade Status column shows Upgrade in progress.
- in the → view
-
in the Events section of the Notification Drawer (
).
You can track the progress of individual virtual machine migrations in the Status column of the → view. In large environments, you may need to filter the results to show a particular group of virtual machines.
You can now update the cluster compatibility version.
4.1.6. Changing the Cluster Compatibility Version Copy linkLink copied to clipboard!
Red Hat Virtualization clusters have a compatibility version. The cluster compatibility version indicates the features of Red Hat Virtualization supported by all of the hosts in the cluster. The cluster compatibility is set according to the version of the least capable host operating system in the cluster.
Prerequisites
- To change the cluster compatibility level, you must first update all the hosts in your cluster to a level that supports your desired compatibility level. Check if there is an icon next to the host indicating an update is available.
Limitations
Virtio NICs are enumerated as a different device after upgrading the cluster compatibility level to 4.6. Therefore, the NICs might need to be reconfigured. Red Hat recommends that you test the virtual machines before you upgrade the cluster by setting the cluster compatibility level to 4.6 on the virtual machine and verifying the network connection.
If the network connection for the virtual machine fails, configure the virtual machine with a custom emulated machine that matches the current emulated machine, for example pc-q35-rhel8.3.0 for 4.5 compatibility version, before upgrading the cluster.
Procedure
- In the Administration Portal, click → .
- Select the cluster to change and click .
- On the General tab, change the Compatibility Version to the desired value.
- Click . The Change Cluster Compatibility Version confirmation dialog opens.
- Click to confirm.
An error message might warn that some virtual machines and templates are incorrectly configured. To fix this error, edit each virtual machine manually. The Edit Virtual Machine window provides additional validations and warnings that show what to correct. Sometimes the issue is automatically corrected and the virtual machine’s configuration just needs to be saved again. After editing each virtual machine, you will be able to change the cluster compatibility version.
You can now update the cluster compatibility version for virtual machines in the cluster.
4.1.7. Changing Virtual Machine Cluster Compatibility Copy linkLink copied to clipboard!
After updating a cluster’s compatibility version, you must update the cluster compatibility version of all running or suspended virtual machines by rebooting them from the Administration Portal, or using the REST API, or from within the guest operating system. Virtual machines that require a reboot are marked with the pending changes icon (
).
Although you can wait to reboot the virtual machines at a convenient time, rebooting immediately is highly recommended so that the virtual machines use the latest configuration. Any virtual machine that has not been rebooted runs with the previous configuration, and subsequent configuration changes made to the virtual machine might overwrite its pending cluster compatibility changes.
Procedure
- In the Administration Portal, click → .
Check which virtual machines require a reboot. In the Vms: search bar, enter the following query:
next_run_config_exists=True
next_run_config_exists=TrueCopy to Clipboard Copied! Toggle word wrap Toggle overflow The search results show all virtual machines with pending changes.
- Select each virtual machine and click Restart. Alternatively, if necessary you can reboot a virtual machine from within the virtual machine itself.
When the virtual machine starts, the new compatibility version is automatically applied.
You cannot change the cluster compatibility version of a virtual machine snapshot that is in preview. You must first commit or undo the preview.
You can now update the data center compatibility version.
4.1.8. Changing the Data Center Compatibility Version Copy linkLink copied to clipboard!
Red Hat Virtualization data centers have a compatibility version. The compatibility version indicates the version of Red Hat Virtualization with which the data center is intended to be compatible. All clusters in the data center must support the desired compatibility level.
Prerequisites
- To change the data center compatibility level, you must first update the compatibility version of all clusters and virtual machines in the data center.
Procedure
- In the Administration Portal, click → .
- Select the data center to change and click .
- Change the Compatibility Version to the desired value.
- Click . The Change Data Center Compatibility Version confirmation dialog opens.
- Click to confirm.
You can also update hosts individually:
4.1.9. Updating Individual Hosts Copy linkLink copied to clipboard!
Use the host upgrade manager to update individual hosts directly from the Administration Portal.
The upgrade manager only checks hosts with a status of Up or Non-operational, but not Maintenance.
Limitations
-
On RHVH, the update only preserves modified content in the
/etcand/vardirectories. Modified data in other paths is overwritten during an update. - If the cluster has migration enabled, virtual machines are automatically migrated to another host in the cluster. Update a host when its usage is relatively low.
- In a self-hosted engine environment, the Manager virtual machine can only migrate between self-hosted engine nodes in the same cluster. It cannot migrate to standard hosts.
- The cluster must have sufficient memory reserved for its hosts to perform maintenance. Otherwise, virtual machine migrations will hang and fail. You can reduce the memory usage of host updates by shutting down some or all virtual machines before updating hosts.
- Do not update all hosts at the same time, as one host must remain available to perform Storage Pool Manager (SPM) tasks.
- You cannot migrate a pinned virtual machine (such as a virtual machine using a vGPU) to another host. Pinned virtual machines must be shut down before updating the host.
Procedure
Ensure that the correct repositories are enabled. To view a list of currently enabled repositories, run
dnf repolist.For Red Hat Virtualization Hosts:
subscription-manager repos --enable=rhvh-4-for-rhel-8-x86_64-rpms
# subscription-manager repos --enable=rhvh-4-for-rhel-8-x86_64-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow For Red Hat Enterprise Linux hosts:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteRHEL 8.6 EUS channels may not be available until RHEL 8.7 is released.
- In the Administration Portal, click → and select the host to be updated.
Click → and click .
Open the Notification Drawer (
) and expand the Events section to see the result.
- If an update is available, click → .
Click to update the host. Running virtual machines are migrated according to their migration policy. If migration is disabled for any virtual machines, you are prompted to shut them down.
The details of the host are updated in → and the status transitions through these stages:
Maintenance > Installing > Reboot > Up
NoteIf the update fails, the host’s status changes to Install Failed. From Install Failed you can click → again.
Repeat this procedure for each host in the Red Hat Virtualization environment.
You should update the hosts from the Administration Portal. However, you can update the hosts using dnf upgrade instead.
4.1.10. Manually Updating Hosts Copy linkLink copied to clipboard!
This information is provided for advanced system administrators who need to update hosts manually, but Red Hat does not support this method. The procedure described in this topic does not include important steps, including certificate renewal, assuming advanced knowledge of such information. Red Hat supports updating hosts using the Administration Portal. For details, see Updating individual hosts or Updating all hosts in a cluster in the Administration Guide.
You can use the dnf command to update your hosts. Update your systems regularly, to ensure timely application of security and bug fixes.
Limitations
-
On RHVH, the update only preserves modified content in the
/etcand/vardirectories. Modified data in other paths is overwritten during an update. - If the cluster has migration enabled, virtual machines are automatically migrated to another host in the cluster. Update a host when its usage is relatively low.
- In a self-hosted engine environment, the Manager virtual machine can only migrate between self-hosted engine nodes in the same cluster. It cannot migrate to standard hosts.
- The cluster must have sufficient memory reserved for its hosts to perform maintenance. Otherwise, virtual machine migrations will hang and fail. You can reduce the memory usage of host updates by shutting down some or all virtual machines before updating hosts.
- Do not update all hosts at the same time, as one host must remain available to perform Storage Pool Manager (SPM) tasks.
- You cannot migrate a pinned virtual machine (such as a virtual machine using a vGPU) to another host. Pinned virtual machines must be shut down before updating the host.
Procedure
Ensure the correct repositories are enabled. You can check which repositories are currently enabled by running
dnf repolist.For Red Hat Virtualization Hosts:
subscription-manager repos --enable=rhvh-4-for-rhel-8-x86_64-rpms
# subscription-manager repos --enable=rhvh-4-for-rhel-8-x86_64-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow For Red Hat Enterprise Linux hosts:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteRHEL 8.6 EUS channels may not be available until RHEL 8.7 is released.
- In the Administration Portal, click → and select the host to be updated.
- Click → and .
For Red Hat Enterprise Linux hosts:
Identify the current version of Red Hat Enterprise Linux:
cat /etc/redhat-release
# cat /etc/redhat-releaseCopy to Clipboard Copied! Toggle word wrap Toggle overflow Check which version of the redhat-release package is available:
dnf --refresh info --available redhat-release
# dnf --refresh info --available redhat-releaseCopy to Clipboard Copied! Toggle word wrap Toggle overflow This command shows any available updates. For example, when upgrading from Red Hat Enterprise Linux 8.2.z to 8.3, compare the version of the package with the currently installed version:
Available Packages Name : redhat-release Version : 8.3 Release : 1.0.el8 …
Available Packages Name : redhat-release Version : 8.3 Release : 1.0.el8 …Copy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantThe Red Hat Enterprise Linux Advanced Virtualization module is usually released later than the Red Hat Enterprise Linux y-stream. If no new Advanced Virtualization module is available yet, or if there is an error enabling it, stop here and cancel the upgrade. Otherwise you risk corrupting the host.
If the Advanced Virtualization stream is available for Red Hat Enterprise Linux 8.3 or later, reset the
virtmodule:dnf module reset virt
# dnf module reset virtCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteIf this module is already enabled in the Advanced Virtualization stream, this step is not necessary, but it has no negative impact.
You can see the value of the stream by entering:
dnf module list virt
# dnf module list virtCopy to Clipboard Copied! Toggle word wrap Toggle overflow Enable the
virtmodule in the Advanced Virtualization stream with the following command:For RHV 4.4.2:
dnf module enable virt:8.2
# dnf module enable virt:8.2Copy to Clipboard Copied! Toggle word wrap Toggle overflow For RHV 4.4.3 to 4.4.5:
dnf module enable virt:8.3
# dnf module enable virt:8.3Copy to Clipboard Copied! Toggle word wrap Toggle overflow For RHV 4.4.6 to 4.4.10:
dnf module enable virt:av
# dnf module enable virt:avCopy to Clipboard Copied! Toggle word wrap Toggle overflow For RHV 4.4 and later:
dnf module enable virt:rhel
# dnf module enable virt:rhelCopy to Clipboard Copied! Toggle word wrap Toggle overflow NoteStarting with RHEL 8.6 the Advanced virtualization packages will use the standard
virt:rhelmodule. For RHEL 8.4 and 8.5, only one Advanced Virtualization stream is used,rhel:av.
Enable version 14 of the
nodejsmodule:dnf module -y enable nodejs:14
# dnf module -y enable nodejs:14Copy to Clipboard Copied! Toggle word wrap Toggle overflow Update the host:
dnf upgrade --nobest
# dnf upgrade --nobestCopy to Clipboard Copied! Toggle word wrap Toggle overflow Reboot the host to ensure all updates are correctly applied.
NoteCheck the imgbased logs to see if any additional package updates have failed for a Red Hat Virtualization Host. If some packages were not successfully reinstalled after the update, check that the packages are listed in /var/imgbased/persisted-rpms. Add any missing packages then run
rpm -Uvh /var/imgbased/persisted-rpms/*.
Repeat this process for each host in the Red Hat Virtualization environment.
Appendix A. Updating the Local Repository for an Offline Red Hat Virtualization Manager Installation Copy linkLink copied to clipboard!
If your Red Hat Virtualization Manager is hosted on a machine that receives packages via FTP from a local repository, you must regularly synchronize the repository to download package updates from the Content Delivery Network, then update or upgrade that machine. Updated packages address security issues, fix bugs, and add enhancements.
On the system hosting the repository, synchronize the repository to download the most recent version of each available package:
reposync --newest-only /var/ftp/pub/rhevrepo
# reposync --newest-only /var/ftp/pub/rhevrepoCopy to Clipboard Copied! Toggle word wrap Toggle overflow This command might download a large number of packages, and take a long time to complete.
- Ensure that the repository is available on the Manager machine, and then update or upgrade the machine.
Appendix B. Installing RHV hypervisors from a local repository Copy linkLink copied to clipboard!
If your system uses a private Red Hat Virtualization (RHV) environment, but without Red Hat Satellite, you might need to install RHV hypervisors (RHV-H) from a repository hosted on a local RHEL system instead of the Red Hat hosted Content Delivery Network (CDN).
Procedure
On the system hosting the offline repository, create a file named
/etc/yum.repos.d/rhvh-mirror.repowith contents similar to the lines that follow:Copy to Clipboard Copied! Toggle word wrap Toggle overflow You must populate the
sslclientcertandsslclientkeyfields with full path names to the correct files containing the appropriate certificate and key. The/etc/pki/entitlementdirectory contains one or more pairs of certificate and key files, but only one pair contains the RHV-H entitlement you need.To find the certificate file:
List all files in the
/etc/pki/entitlementdirectory:ls -al /etc/pki/entitlement/
# ls -al /etc/pki/entitlement/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Output similar to the following is displayed:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Use the
rct cat-certcommand on each certificate in order to find the one that contains the RHV-H entitlement:cd /etc/pki/entitlement/ rct cat-cert 5659494963772844103.pem | grep rhvh/4/ | grep URL
# cd /etc/pki/entitlement/ # rct cat-cert 5659494963772844103.pem | grep rhvh/4/ | grep URLCopy to Clipboard Copied! Toggle word wrap Toggle overflow Output similar to the following is displayed:
URL: /content/beta/rhel/server/7/$basearch/rhvh/4/os URL: /content/dist/rhel/server/7/7Server/$basearch/rhvh/4/os URL: /content/beta/layered/rhel8/x86_64/rhvh/4/os URL: /content/dist/layered/rhel8/x86_64/rhvh/4/osURL: /content/beta/rhel/server/7/$basearch/rhvh/4/os URL: /content/dist/rhel/server/7/7Server/$basearch/rhvh/4/os URL: /content/beta/layered/rhel8/x86_64/rhvh/4/os URL: /content/dist/layered/rhel8/x86_64/rhvh/4/osCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Identify the correct certificate and fill in the
sslclientcertandsslclientkeyvalues in the previously mentioned.repofile:sslclientcert = /etc/pki/entitlement/5659494963772844103.pem sslclientkey = /etc/pki/entitlement/5659494963772844103-key.pem
sslclientcert = /etc/pki/entitlement/5659494963772844103.pem sslclientkey = /etc/pki/entitlement/5659494963772844103-key.pemCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run the
reposynccommand in the appropriate directory:Use the 'pwd' command to determine the correct path:
pwd
# pwdCopy to Clipboard Copied! Toggle word wrap Toggle overflow Output similar to the following is displayed:
/home/test/rhvh-reposync
/home/test/rhvh-reposyncCopy to Clipboard Copied! Toggle word wrap Toggle overflow Run the
reposynccommand:reposync --repo rhvh-4-for-rhel-8-x86_64-rpms
# reposync --repo rhvh-4-for-rhel-8-x86_64-rpmsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Output similar to the following is displayed:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
-
Check the certificate and key file pairs each time you run the
reposynccommand because the Subscription Manager subsystem periodically regenerates them.
Appendix C. Legal notice Copy linkLink copied to clipboard!
Copyright © 2022 Red Hat, Inc.
Licensed under the (Creative Commons Attribution–ShareAlike 4.0 International License). Derived from documentation for the (oVirt Project). If you distribute this document or an adaptation of it, you must provide the URL for the original version.
Modified versions must remove all Red Hat trademarks.
Red Hat, Red Hat Enterprise Linux, the Red Hat logo, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation’s permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.