- Issued:
- 2015-01-15
- Updated:
- 2015-01-15
RHBA-2015:0039 - Red Hat Storage Console 3.0 enhancement and bug fix update #3
Synopsis
Red Hat Storage Console 3.0 enhancement and bug fix update #3
Type/Severity
Bug Fix Advisory
Topic
Updated gluster-nagios-common, rhsc-monitoring-uiplugin, rhsc-setup-plugins, org.ovirt.engine-root, rhevm-branding-rhev, otopi, ovirt-host-deploy, nagios-server-addons, and rhsc-doc packages that fix multiple bugs and adds various enhancements are now available for Red Hat Storage Console 3.
Description
Red Hat Storage Console is a powerful and simple web based Graphical User Interface for managing a Red Hat Storage environment. It helps storage administrators to easily create and manage multiple storage pools.
This advisory fixes various bugs in the Red Hat Storage Console Monitoring User Interface Plug-in, Red Hat Storage Console Setup Plug-in, and Red Hat Storage Console nagios-server-addons. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Storage 3 Technical Notes, linked to in the References section, for information on the most significant of these changes.
This update also adds the following new enhancements:
- A navigation link is added to the GlusterFS Monitoring Home page in the Trends tab of Red Hat Storage Console. (BZ# 1138143)
- A new command is introduced to enable and disable monitoring using the command line interface (CLI) after setting up Red Hat Storage Console. When monitoring is enabled on the server, the Trends tab is displayed with host and cluster utilization details. (BZ# 1111079)
- An enhancement has been added to brick utilization to display both the thin-logical volume utilization and the actual thin pool utilization for bricks with thin-logical volume. (BZ# 1143995)
All users of Red Hat Storage are advised to install these updated packages.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Gluster Storage Server for On-premise | 3 | x86_64 |
| Red Hat Gluster Storage Nagios Server | 3 | x86_64 |
| Red Hat Gluster Storage Management Console (for RHEL Server) | 3 | x86_64 |
Updated Packages
- otopi-repolib-1.2.2-1.el6ev.noarch.rpm
- rhsc-dbscripts-3.0.3-1.20.el6rhs.noarch.rpm
- ovirt-host-deploy-java-1.2.5-1.el6ev.noarch.rpm
- gluster-nagios-common-0.1.4-1.el6rhs.src.rpm
- rhsc-doc-3.0.0-7.el6rhs.src.rpm
- rhsc-lib-3.0.3-1.20.el6rhs.noarch.rpm
- rhsc-3.0.3-1.20.el6rhs.noarch.rpm
- rhsc-tools-3.0.3-1.20.el6rhs.noarch.rpm
- rhsc-setup-plugins-3.0.3-1.1.el6rhs.src.rpm
- otopi-devtools-1.2.2-1.el6ev.noarch.rpm
- rhsc-3.0.3-1.20.el6rhs.src.rpm
- ovirt-host-deploy-1.2.5-1.el6ev.noarch.rpm
- rhsc-setup-plugins-3.0.3-1.1.el6rhs.noarch.rpm
- rhsc-doc-3.0.0-7.el6rhs.noarch.rpm
- otopi-1.2.2-1.el6ev.noarch.rpm
- rhsc-restapi-3.0.3-1.20.el6rhs.noarch.rpm
- rhsc-setup-plugin-ovirt-engine-3.0.3-1.20.el6rhs.noarch.rpm
- ovirt-host-deploy-1.2.5-1.el6ev.src.rpm
- nagios-server-addons-0.1.11-1.el6rhs.noarch.rpm
- rhsc-monitoring-uiplugin-0.1.3-1.el6rhs.src.rpm
- rhevm-branding-rhev-3.4.0-2.el6ev.noarch.rpm
- otopi-1.2.2-1.el6ev.src.rpm
- gluster-nagios-common-0.1.4-1.el6rhs.noarch.rpm
- rhsc-backend-3.0.3-1.20.el6rhs.noarch.rpm
- nagios-server-addons-0.1.11-1.el6rhs.src.rpm
- rhsc-monitoring-uiplugin-0.1.3-1.el6rhs.noarch.rpm
- rhevm-branding-rhev-3.4.0-2.el6ev.src.rpm
- rhsc-setup-3.0.3-1.20.el6rhs.noarch.rpm
- rhsc-setup-plugin-ovirt-engine-common-3.0.3-1.20.el6rhs.noarch.rpm
- otopi-java-1.2.2-1.el6ev.noarch.rpm
- rhsc-setup-base-3.0.3-1.20.el6rhs.noarch.rpm
- rhsc-webadmin-portal-3.0.3-1.20.el6rhs.noarch.rpm
- ovirt-host-deploy-repolib-1.2.5-1.el6ev.noarch.rpm
Fixes
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
- This content is not included.BZ - RHBA-2015:0039
CVEs
(none)
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.