how to download systemvm64 for 4.3.2
Hey I want to install cs 4.3.2,I have download the rpm package from http://jenkins.buildacloud.org/view/4.3/job/cloudstack-4.3-package-rpm/ but there is no cloudstack-4.3-systemvm64 for download how could I get it? thanks -- 白清杰 (Born Bai) Mail: linux...@gmail.com
Re: how to download systemvm64 for 4.3.2
thanks our hypervisior is xenserver 6.2 we have found some systemvm template from http://download.cloud.com/templates/4.3/systemvm64template-2014-09-30-4.3-xen.vhd.bz2 http://packages.shapeblue.com/systemvmtemplate/4.3/4.3.1/systemvm64template-2014-11-04-4.3.1-xen.vhd.bz2 http://download.cloud.com/templates/4.3/systemvm64template-2014-06-23-master-xen.vhd.bz2 we notice there are some systemvm bugs was fixed in 4.3.2 so is there a newest systemvm template for 4.3.2 2014-12-24 16:13 GMT+08:00 Gopalakrishnan S : > Hi, > > You can download cloudstack 4.3 KVM hypervisor system template here. > > http://cloudstack.apt-get.eu/systemvm/4.3/ > > Thank You. > Gopalakrishnan.S > > - Original Message - From: > To: > Sent: Wednesday, December 24, 2014 1:27 PM > Subject: how to download systemvm64 for 4.3.2 > > > > Hey I want to install cs 4.3.2,I have download the rpm package from > http://jenkins.buildacloud.org/view/4.3/job/cloudstack-4.3-package-rpm/ > > but there is no cloudstack-4.3-systemvm64 for download > > how could I get it? > > thanks > > > > > -- > 白清杰 (Born Bai) > > Mail: linux...@gmail.com -- 白清杰 (Born Bai) Mail: linux...@gmail.com
Re: how to download systemvm64 for 4.3.2
thank you Rohit 2014-12-24 16:52 GMT+08:00 Rohit Yadav : > Hi, > > You can use the 4.3.1 template (it was built on 11 Nov 2014, so latest > among other options) and has the latest bash and POODLE fix (and a minor > fix): > > http://packages.shapeblue.com/systemvmtemplate/4.3/4.3.1/ > > If you're not sure about your current 4.3.1 template, you can use the > following tool to test if you need to upgrade your systemvm templates; > http://packages.shapeblue.com/tools/poodle-checker.sh > > For 4.3.2, there is no need to setup a new template and people should be > able to continue to use 4.3.1/4.3.0 templates. If there are lot of > people who simply want a 4.3.2 for just having latest systemvm (with > updated packages etc) I can help build one. > > > On Wednesday 24 December 2014 01:56 PM, linux...@gmail.com wrote: >> >> thanks >> our hypervisior is xenserver 6.2 >> we have found some systemvm template from >> >> >> http://download.cloud.com/templates/4.3/systemvm64template-2014-09-30-4.3-xen.vhd.bz2 >> >> >> http://packages.shapeblue.com/systemvmtemplate/4.3/4.3.1/systemvm64template-2014-11-04-4.3.1-xen.vhd.bz2 >> >> >> http://download.cloud.com/templates/4.3/systemvm64template-2014-06-23-master-xen.vhd.bz2 >> >> >> we notice there are some systemvm bugs was fixed in 4.3.2 >> >> so is there a newest systemvm template for 4.3.2 >> >> >> 2014-12-24 16:13 GMT+08:00 Gopalakrishnan S : >>> >>> Hi, >>> >>> You can download cloudstack 4.3 KVM hypervisor system template here. >>> >>> http://cloudstack.apt-get.eu/systemvm/4.3/ >>> >>> Thank You. >>> Gopalakrishnan.S >>> >>> - Original Message - From: >>> To: >>> Sent: Wednesday, December 24, 2014 1:27 PM >>> Subject: how to download systemvm64 for 4.3.2 >>> >>> >>> >>> Hey I want to install cs 4.3.2,I have download the rpm package from >>> http://jenkins.buildacloud.org/view/4.3/job/cloudstack-4.3-package-rpm/ >>> >>> but there is no cloudstack-4.3-systemvm64 for download >>> >>> how could I get it? >>> >>> thanks >>> >>> >>> >>> >>> -- >>> 白清杰 (Born Bai) >>> >>> Mail: linux...@gmail.com >> >> >> >> > > -- > Regards, > Rohit Yadav > Software Architect, ShapeBlue > M. +91 8826230892 | rohit.ya...@shapeblue.com > Blog: bhaisaab.org | Twitter: @_bhaisaab > PS. If you see any footer below, I did not add it :) > Find out more about ShapeBlue and our range of CloudStack related services > > IaaS Cloud Design & > Build<http://shapeblue.com/iaas-cloud-design-and-build//> > CSForge – rapid IaaS deployment framework<http://shapeblue.com/csforge/> > CloudStack Consulting<http://shapeblue.com/cloudstack-consultancy/> > CloudStack Software > Engineering<http://shapeblue.com/cloudstack-software-engineering/> > CloudStack Infrastructure > Support<http://shapeblue.com/cloudstack-infrastructure-support/> > CloudStack Bootcamp Training > Courses<http://shapeblue.com/cloudstack-training/> > > This email and any attachments to it may be confidential and are intended > solely for the use of the individual to whom it is addressed. Any views or > opinions expressed are solely those of the author and do not necessarily > represent those of Shape Blue Ltd or related companies. If you are not the > intended recipient of this email, you must neither take any action based > upon its contents, nor copy or show it to anyone. Please contact the sender > if you believe you have received this email in error. Shape Blue Ltd is a > company incorporated in England & Wales. ShapeBlue Services India LLP is a > company incorporated in India and is operated under license from Shape Blue > Ltd. Shape Blue Brasil Consultoria Ltda is a company incorporated in Brasil > and is operated under license from Shape Blue Ltd. ShapeBlue SA Pty Ltd is a > company registered by The Republic of South Africa and is traded under > license from Shape Blue Ltd. ShapeBlue is a registered trademark. -- 白清杰 (Born Bai) Mail: linux...@gmail.com
Re: how to download systemvm64 for 4.3.2
hey ALL: we have tested CloudStack 4.3.2 + xenserver 6.2 when we use http://packages.shapeblue.com/systemvmtemplate/4.3/4.3.1/systemvm64template-2014-11-04-4.3.1-xen.vhd.bz2 as the sysyem vm template, the SSVM and CPVM couldn't runing. we use http://download.cloud.com/templates/4.3/systemvm64template-2014-09-30-4.3-xen.vhd.bz2 as the system vm template ,it worked 2014-12-24 17:19 GMT+08:00 Andrija Panic : > H Rohit - I have not found a bug/bgfix - just tested and confirmed the > issue in 4.3 and no issue in 4.4... > Will have to upgrade anyway - so will have the answer for my self I guess... > > Thanks > > On 24 December 2014 at 10:17, Rohit Yadav wrote: > >> Hi Andrija, >> >> On Wednesday 24 December 2014 02:33 PM, Andrija Panic wrote: >> >>> Hi Rohit, >>> >>> do you know if these templates (4.3.1) include proper source/remote IP >>> when >>> doing single Port Forwarding on VPC VR ? >>> In 4.3.0 - internal VM sees that all outside connections come from main >>> IP >>> of the VPC VR - instead from the real remote client IP. I'm not talking >>> here about proxy - same behaviour here, but this is expected. >>> This port forwarding remote IP issue - is fixed in 4.4.x, so wondering if >>> bug fixes are also backported in 4.3.1 template... >>> >> >> Can you point me the bugfix in 4.4.x as I don't remember anything around >> this specific issue though I think I had backported few port >> forwarding/networking related fixes on 4.3 branch. >> >> >> >>> Thanks. >>> >>> On 24 December 2014 at 09:52, Rohit Yadav >>> wrote: >>> >>> Hi, >>>> >>>> You can use the 4.3.1 template (it was built on 11 Nov 2014, so latest >>>> among other options) and has the latest bash and POODLE fix (and a minor >>>> fix): >>>> >>>> http://packages.shapeblue.com/systemvmtemplate/4.3/4.3.1/ >>>> >>>> If you're not sure about your current 4.3.1 template, you can use the >>>> following tool to test if you need to upgrade your systemvm templates; >>>> http://packages.shapeblue.com/tools/poodle-checker.sh >>>> >>>> For 4.3.2, there is no need to setup a new template and people should be >>>> able to continue to use 4.3.1/4.3.0 templates. If there are lot of >>>> people who simply want a 4.3.2 for just having latest systemvm (with >>>> updated packages etc) I can help build one. >>>> >>>> >>>> On Wednesday 24 December 2014 01:56 PM, linux...@gmail.com wrote: >>>> >>>> thanks >>>>> our hypervisior is xenserver 6.2 >>>>> we have found some systemvm template from >>>>> >>>>> http://download.cloud.com/templates/4.3/systemvm64template-2014-09-30- >>>>> 4.3-xen.vhd.bz2 >>>>> >>>>> http://packages.shapeblue.com/systemvmtemplate/4.3/4.3.1/ >>>>> systemvm64template-2014-11-04-4.3.1-xen.vhd.bz2 >>>>> >>>>> http://download.cloud.com/templates/4.3/systemvm64template-2014-06-23- >>>>> master-xen.vhd.bz2 >>>>> >>>>> >>>>> we notice there are some systemvm bugs was fixed in 4.3.2 >>>>> >>>>> so is there a newest systemvm template for 4.3.2 >>>>> >>>>> >>>>> 2014-12-24 16:13 GMT+08:00 Gopalakrishnan S : >>>>> >>>>> Hi, >>>>>> >>>>>> You can download cloudstack 4.3 KVM hypervisor system template here. >>>>>> >>>>>> http://cloudstack.apt-get.eu/systemvm/4.3/ >>>>>> >>>>>> Thank You. >>>>>> Gopalakrishnan.S >>>>>> >>>>>> - Original Message - From: >>>>>> To: >>>>>> Sent: Wednesday, December 24, 2014 1:27 PM >>>>>> Subject: how to download systemvm64 for 4.3.2 >>>>>> >>>>>> >>>>>> >>>>>> Hey I want to install cs 4.3.2,I have download the rpm package from >>>>>> http://jenkins.buildacloud.org/view/4.3/job/cloudstack-4. >>>>>> 3-package-rpm/ >>>>>> >>>>>> but there is no cloudstack-4.3-systemvm64 for download >>>>>> >>>>>> how could I get it? >>>>>> >>>>>> thanks >>>>>> &
Re: how to download systemvm64 for 4.3.2
this is the log of cloudstack management 2014-12-30 00:00:13,683 DEBUG [c.c.a.m.DirectAgentAttache] (DirectAgent-6:ctx-cd8013c1) Ping from 3(xenserver-101) 2014-12-30 00:00:15,338 DEBUG [c.c.s.StatsCollector] (StatsCollector-3:ctx-203fdb06) StorageCollector is running... 2014-12-30 00:00:15,342 DEBUG [c.c.s.StatsCollector] (StatsCollector-3:ctx-203fdb06) There is no secondary storage VM for secondary storage host secondary 2014-12-30 00:00:15,344 DEBUG [c.c.a.m.DirectAgentAttache] (DirectAgent-37:ctx-4e2f7e51) Seq 3-1633690662: Executing request 2014-12-30 00:00:15,551 DEBUG [c.c.a.m.DirectAgentAttache] (DirectAgent-37:ctx-4e2f7e51) Seq 3-1633690662: Response Received: 2014-12-30 00:00:15,551 DEBUG [c.c.a.t.Request] (StatsCollector-3:ctx-203fdb06) Seq 3-1633690662: Received: { Ans: , MgmtId: 345051527295, via: 3, Ver: v1, Flags: 10, { GetStorageStatsAnswer } } 2014-12-30 00:00:21,436 DEBUG [c.c.a.m.DirectAgentAttache] (DirectAgent-435:ctx-ae00c3b8) Seq 3-1633681412: Executing request 2014-12-30 00:00:21,601 DEBUG [c.c.a.m.DirectAgentAttache] (DirectAgent-435:ctx-ae00c3b8) Seq 3-1633681412: Response Received: 2014-12-30 00:00:21,601 DEBUG [c.c.a.t.Request] (DirectAgent-435:ctx-ae00c3b8) Seq 3-1633681412: Processing: { Ans: , MgmtId: 345051527295, via: 3, Ver: v1, Flags: 10, [{"com.cloud.agent.api.ClusterSyncAnswer":{"_clusterId":3,"_newStates":{},"_isExecuted":false,"result":true,"wait":0}}] } 2014-12-30 00:00:28,050 DEBUG [c.c.s.StatsCollector] (StatsCollector-1:ctx-739de8fa) VmStatsCollector is running... 2014-12-30 00:00:30,550 DEBUG [c.c.n.r.VirtualNetworkApplianceManagerImpl] (RouterStatusMonitor-1:ctx-049423b4) Found 0 routers to update status. 2014-12-30 00:00:30,551 DEBUG [c.c.n.r.VirtualNetworkApplianceManagerImpl] (RouterStatusMonitor-1:ctx-049423b4) Found 0 networks to update RvR status. 2014-12-30 00:00:30,946 DEBUG [c.c.a.m.DirectAgentAttache] (DirectAgent-269:ctx-454cfbb4) Seq 3-1013523424: Executing request 2014-12-30 00:00:31,114 DEBUG [c.c.a.m.DirectAgentAttache] (DirectAgent-269:ctx-454cfbb4) Seq 3-1013523424: Response Received: 2014-12-30 00:00:31,114 DEBUG [c.c.a.m.ClusteredAgentManagerImpl] (DirectAgent-269:ctx-454cfbb4) Seq 3-1013523424: MgmtId 345051527296: Resp: Routing to peer 2014-12-30 00:00:42,293 DEBUG [c.c.c.ConsoleProxyManagerImpl] (consoleproxy-1:ctx-d9427590) Zone 3 is not ready to launch console proxy yet 2014-12-30 00:00:48,718 DEBUG [c.c.s.StatsCollector] (StatsCollector-2:ctx-505955ec) HostStatsCollector is running... 2014-12-30 00:00:48,724 DEBUG [c.c.a.m.DirectAgentAttache] (DirectAgent-168:ctx-78edd1ed) Seq 3-1633690663: Executing request 2014-12-30 00:00:48,877 DEBUG [c.c.a.m.DirectAgentAttache] (DirectAgent-168:ctx-78edd1ed) Seq 3-1633690663: Response Received: 2014-12-30 00:00:48,877 DEBUG [c.c.a.t.Request] (StatsCollector-2:ctx-505955ec) Seq 3-1633690663: Received: { Ans: , MgmtId: 345051527295, via: 3, Ver: v1, Flags: 10, { GetHostStatsAnswer } } 2014-12-30 00:00:53,662 DEBUG [c.c.a.m.DirectAgentAttache] (DirectAgent-451:ctx-41ebaa9b) Seq 3-1013523425: Executing request 2014-12-30 00:00:53,862 DEBUG [c.c.a.m.DirectAgentAttache] (DirectAgent-451:ctx-41ebaa9b) Seq 3-1013523425: Response Received: 2014-12-30 00:00:53,863 DEBUG [c.c.a.m.ClusteredAgentManagerImpl] (DirectAgent-451:ctx-41ebaa9b) Seq 3-1013523425: MgmtId 345051527296: Resp: Routing to peer 2014-12-30 00:01:00,549 DEBUG [c.c.n.r.VirtualNetworkApplianceManagerImpl] (RouterMonitor-1:ctx-18fafab9) Found 0 running routers. 2014-12-30 00:01:00,550 DEBUG [c.c.n.r.VirtualNetworkApplianceManagerImpl] (RouterStatusMonitor-1:ctx-de7b0e26) Found 0 routers to update status. 2014-12-30 00:01:00,551 DEBUG [c.c.n.r.VirtualNetworkApplianceManagerImpl] (RouterStatusMonitor-1:ctx-de7b0e26) Found 0 networks to update RvR status. 2014-12-30 00:01:00,592 DEBUG [c.c.n.ExternalDeviceUsageManagerImpl] (ExternalNetworkMonitor-1:ctx-af40581c) External devices stats collector is running... 2014-12-30 00:01:00,706 DEBUG [c.c.s.s.SnapshotSchedulerImpl] (SnapshotPollTask:ctx-dbe63efa) Snapshot scheduler.poll is being called at 2014-12-29 16:01:00 GMT 2014-12-30 00:01:00,706 DEBUG [c.c.s.s.SnapshotSchedulerImpl] (SnapshotPollTask:ctx-dbe63efa) Got 0 snapshots to be executed at 2014-12-29 16:01:00 GMT 2014-12-30 00:01:12,294 DEBUG [c.c.c.ConsoleProxyManagerImpl] (consoleproxy-1:ctx-63f234a8) Zone 3 is not ready to launch console proxy yet 2014-12-30 14:40 GMT+08:00 Tejas Sheth : > Hi, > > You are using 4.3 systemvmtemplate. try 4.3.1 updated systemvmtemplate > with 4.3.2 > > Thanks, > Tejas > > On Tue, Dec 30, 2014 at 11:57 AM, linux...@gmail.com > wrote: > >> hey ALL: >> >> we have tested CloudStack 4.3.2 + xenserver 6.2 >> >> when we use >> >> >> http://packages.shapeblue.com/systemvmtemplate/4.3/4.3.1/systemvm64template-2014-11-04-4.3.1-
Re: how to download systemvm64 for 4.3.2
thanks Rohit we check the md5sum. the md5sum we download is different we will download a new one and try it thanks for your help 2014-12-30 15:18 GMT+08:00 Rohit Yadav : > Hi, > > On Tuesday 30 December 2014 11:57 AM, linux...@gmail.com wrote: >> >> hey ALL: >> >> we have tested CloudStack 4.3.2 + xenserver 6.2 >> >> when we use >> >> >> http://packages.shapeblue.com/systemvmtemplate/4.3/4.3.1/systemvm64template-2014-11-04-4.3.1-xen.vhd.bz2 >> >> as the sysyem vm template, the SSVM and CPVM couldn't runing. > > > Both the templates are functionally same, the latest one has latest bash > (shellshock) and POODLE fixes (use TLSv3 in apache). > > When you downloaded the template did you verify the checksum and did you > use the same method to seed the template? > > The logs you shared don't say much, while I don't for sure - it could be > faulty downloaded template (network/disk issue where you downloaded it) > or secondary storage (where you pre-seeded it) as well. How much time > did you wait on the first template? > >> we use >> >> http://download.cloud.com/templates/4.3/systemvm64template-2014-09-30-4.3-xen.vhd.bz2 >> >> >> as the system vm template ,it worked > > > Glad that worked, you can use this template as well but it has older > bash and uses SSLv2/v3 etc for apache, using this is alright until the > deployment is a test setup or private setup. > > > >> 2014-12-24 17:19 GMT+08:00 Andrija Panic : >>> >>> H Rohit - I have not found a bug/bgfix - just tested and confirmed the >>> issue in 4.3 and no issue in 4.4... >>> Will have to upgrade anyway - so will have the answer for my self I >>> guess... >>> >>> Thanks >>> >>> On 24 December 2014 at 10:17, Rohit Yadav >>> wrote: >>> >>>> Hi Andrija, >>>> >>>> On Wednesday 24 December 2014 02:33 PM, Andrija Panic wrote: >>>> >>>>> Hi Rohit, >>>>> >>>>> do you know if these templates (4.3.1) include proper source/remote IP >>>>> when >>>>> doing single Port Forwarding on VPC VR ? >>>>> In 4.3.0 - internal VM sees that all outside connections come from >>>>> main >>>>> IP >>>>> of the VPC VR - instead from the real remote client IP. I'm not talking >>>>> here about proxy - same behaviour here, but this is expected. >>>>> This port forwarding remote IP issue - is fixed in 4.4.x, so wondering >>>>> if >>>>> bug fixes are also backported in 4.3.1 template... >>>>> >>>> >>>> Can you point me the bugfix in 4.4.x as I don't remember anything around >>>> this specific issue though I think I had backported few port >>>> forwarding/networking related fixes on 4.3 branch. >>>> >>>> >>>> >>>>> Thanks. >>>>> >>>>> On 24 December 2014 at 09:52, Rohit Yadav >>>>> wrote: >>>>> >>>>> Hi, >>>>>> >>>>>> >>>>>> You can use the 4.3.1 template (it was built on 11 Nov 2014, so latest >>>>>> among other options) and has the latest bash and POODLE fix (and a >>>>>> minor >>>>>> fix): >>>>>> >>>>>> http://packages.shapeblue.com/systemvmtemplate/4.3/4.3.1/ >>>>>> >>>>>> If you're not sure about your current 4.3.1 template, you can use the >>>>>> following tool to test if you need to upgrade your systemvm templates; >>>>>> http://packages.shapeblue.com/tools/poodle-checker.sh >>>>>> >>>>>> For 4.3.2, there is no need to setup a new template and people should >>>>>> be >>>>>> able to continue to use 4.3.1/4.3.0 templates. If there are lot of >>>>>> people who simply want a 4.3.2 for just having latest systemvm (with >>>>>> updated packages etc) I can help build one. >>>>>> >>>>>> >>>>>> On Wednesday 24 December 2014 01:56 PM, linux...@gmail.com wrote: >>>>>> >>>>>> thanks >>>>>>> >>>>>>> our hypervisior is xenserver 6.2 >>>>>>> we have found some systemvm template from >>>>>>> >>>>>>> >>>>>>>
cloudstack 4.3.2 + xenserver 6.2 with all patchs,couldn't start system vm
eived: { Ans: , MgmtId: 345051527295, via: 4, Ver: v1, Flags: 10, { GetStorageStatsAnswer } } 2014-12-30 17:18:44,377 DEBUG [c.c.c.ConsoleProxyManagerImpl] (consoleproxy-1:ctx-ed8adb60) Zone 1 is not ready to launch console proxy yet -- 白清杰 (Born Bai) Mail: linux...@gmail.com
Re: RE: cloudstack 4.3.2 + xenserver 6.2 with all patchs,couldn't start system vm
1、we install xenserver 6.2 with no patch 2、we install cloudstack and the ssvm cpvm could running 3、we disable the zone,remove ssvm and cpvm 4、we install all the patchs of xenserver 5、after patched xenserver we enable the zone on cloudstack at this time,the log told us Zone 1 is not ready to launch console proxy yet 2014-12-30 23:54 GMT+08:00 Matthew Midgett : > Did you patch before or after installing cloudstack? I think some of files > that acs puts on the hypervisors get overwritten. I saw someone talking about > this on the mailing list before. I'm mobile today so can't provide the files > and directories to be updated. > > Original message From: linux...@gmail.com > Date:12/30/2014 4:43 AM (GMT-05:00) To: > users@cloudstack.apache.org Subject: cloudstack 4.3.2 + xenserver > 6.2 with all patchs,couldn't start > system vm > Hey ALL: > >we are testing cloustack 4.3.2 .our hypervisior is xenserver > 6.2 with all patchs > the system vm template is > http://download.cloud.com/templates/4.3/systemvm64template-2014-09-30-4.3-xen.vhd.bz2 > > we have tryed basic network and advanced network > > when xenserver 6.2 is not patched ,it worked fine > > after we patched xenserver 6.2 with all patch,the systemvm couldn't running > > this is the log of management : > > > > 2014-12-30 17:17:47,512 DEBUG [c.c.a.m.DirectAgentAttache] > (DirectAgent-28:ctx-52719350) Seq 4-417988800: Executing request > > 2014-12-30 17:17:47,722 DEBUG [c.c.a.m.DirectAgentAttache] > (DirectAgent-28:ctx-52719350) Seq 4-417988800: Response Received: > > 2014-12-30 17:17:47,722 DEBUG [c.c.a.m.ClusteredAgentManagerImpl] > (DirectAgent-28:ctx-52719350) Seq 4-417988800: MgmtId 345051527296: > Resp: Routing to peer > > 2014-12-30 17:17:58,813 DEBUG > [c.c.n.r.VirtualNetworkApplianceManagerImpl] > (RouterStatusMonitor-1:ctx-b73976d7) Found 0 routers to update status. > > 2014-12-30 17:17:58,814 DEBUG > [c.c.n.r.VirtualNetworkApplianceManagerImpl] > (RouterStatusMonitor-1:ctx-b73976d7) Found 0 networks to update RvR > status. > > 2014-12-30 17:18:08,433 DEBUG [c.c.a.m.DirectAgentAttache] > (DirectAgent-246:ctx-0222d7ab) Ping from 4(xenserver-101) > > 2014-12-30 17:18:08,820 DEBUG [c.c.a.m.DirectAgentAttache] > (DirectAgent-143:ctx-3ae568b1) Seq 4-1243152388: Executing request > > 2014-12-30 17:18:09,008 DEBUG [c.c.a.m.DirectAgentAttache] > (DirectAgent-143:ctx-3ae568b1) Seq 4-1243152388: Response Received: > > 2014-12-30 17:18:09,009 DEBUG [c.c.a.t.Request] > (DirectAgent-143:ctx-3ae568b1) Seq 4-1243152388: Processing: { Ans: , > MgmtId: 345051527295, via: 4, Ver: v1, Flags: 10, > [{"com.cloud.agent.api.ClusterSyncAnswer":{"_clusterId":1,"_newStates":{},"_isExecuted":false,"result":true,"wait":0}}] > } > > 2014-12-30 17:18:14,378 DEBUG [c.c.c.ConsoleProxyManagerImpl] > (consoleproxy-1:ctx-04c0e3de) Zone 1 is not ready to launch console > proxy yet > > 2014-12-30 17:18:14,758 DEBUG [c.c.s.StatsCollector] > (StatsCollector-2:ctx-5f9e7528) VmStatsCollector is running... > > 2014-12-30 17:18:28,813 DEBUG > [c.c.n.r.VirtualNetworkApplianceManagerImpl] > (RouterStatusMonitor-1:ctx-2da8a4a0) Found 0 routers to update status. > > 2014-12-30 17:18:28,814 DEBUG > [c.c.n.r.VirtualNetworkApplianceManagerImpl] > (RouterStatusMonitor-1:ctx-2da8a4a0) Found 0 networks to update RvR > status. > > 2014-12-30 17:18:31,605 DEBUG [c.c.a.m.DirectAgentAttache] > (DirectAgent-247:ctx-2929f84f) Seq 4-417988801: Executing request > > 2014-12-30 17:18:31,758 DEBUG [c.c.a.m.DirectAgentAttache] > (DirectAgent-247:ctx-2929f84f) Seq 4-417988801: Response Received: > > 2014-12-30 17:18:31,759 DEBUG [c.c.a.m.ClusteredAgentManagerImpl] > (DirectAgent-247:ctx-2929f84f) Seq 4-417988801: MgmtId 345051527296: > Resp: Routing to peer > > 2014-12-30 17:18:33,902 DEBUG [c.c.h.d.HostDaoImpl] > (ClusteredAgentManager Timer:ctx-29831b59) Resetting hosts suitable > for reconnect > > 2014-12-30 17:18:33,903 DEBUG [c.c.h.d.HostDaoImpl] > (ClusteredAgentManager Timer:ctx-29831b59) Completed resetting hosts > suitable for reconnect > > 2014-12-30 17:18:33,903 DEBUG [c.c.h.d.HostDaoImpl] > (ClusteredAgentManager Timer:ctx-29831b59) Acquiring hosts for > clusters already owned by this management server > > 2014-12-30 17:18:33,905 DEBUG [c.c.h.d.HostDaoImpl] > (ClusteredAgentManager Timer:ctx-29831b59) Completed acquiring hosts > for clusters already owned by this management server > > 2014-12-30 17:18:33,905 DEBUG [c.c.h.d.HostDaoImpl] > (ClusteredAgentManager Timer:ctx-29831b59) Acquiring hosts for > clusters not owned by any management server > > 2014-12-30 17:18
Re: XenServer Creedence support
cloud ACS support XenServer Creedence + ceph 2015-01-03 18:04 GMT+08:00 Daan Hoogland : > We will have to patch and release at minimum. not out of the box. > > On Fri, Jan 2, 2015 at 8:22 PM, Matthew Midgett > wrote: >> Will ACS 4.4 support Xenserver Creedence when it is released? >> > > > > -- > Daan -- 白清杰 (Born Bai) Mail: linux...@gmail.com
Re: Ansible CloudStack modules
great job thanks 2015-01-03 23:19 GMT+08:00 Rene Moser : > Hi again > > On 12/18/2014 03:44 PM, Sebastien Goasguen wrote: > >> Thanks for Sharing René, I tested the VM one couple days ago and it works >> perfect. >> I'd love to see one for key paris and secruitygroups. > > Security group management (group and rules) has been added, e.g.: > > - name: ensure security group default exist > cloudstack_sg: > name: default > > - name: add inbound SSH to security group default > cloudstack_sg_rule: > name: default > start_port: 22 > end_port: 22 > > I made a small example playbook [1] which installs yacy [2] from scratch > on exoscale. > > > [1] https://github.com/resmo/ansible-cloudstack-example > [2] http://www.yacy.net/en/ > > > -- 白清杰 (Born Bai) Mail: linux...@gmail.com
GHOST glibc Remote Code Execution Vulnerability Affects All Linux Systems - See more at: https://threatpost.com/ghost-glibc-remote-code-execution-vulnerability-affects-all-linux-systems/110679#sthash.
A critical vulnerability has been found in glibc, the GNU C library, that affects all Linux systems dating back to 2000. Attackers can use this flaw to execute code and remotely gain control of Linux machines. The issue stems from a heap-based buffer overflow found in the __nss_hostname_digits_dots() function in glibc. That particular function is used by the _gethostbyname function calls. Related Posts Shellshock Worm Exploiting Unpatched QNAP NAS Devices December 15, 2014 , 11:35 am Linux Modules Connected to Turla APT Discovered December 9, 2014 , 10:26 am Bash Exploit Reported, First Round of Patches Incomplete September 25, 2014 , 11:41 am “A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application,” said an advisory from Linux distributor Red Hat. The vulnerability, CVE-2015-0235, has already been nicknamed GHOST because of its relation to the _gethostbyname function. Researchers at Qualys discovered the flaw, and say it goes back to glibc version 2.2 in Linux systems published in November 2000. According to Qualys, there is a mitigation for this issue that was published May 21, 2013 between patch glibc-2.17 versions and glibc-2.18. “Unfortunately, it was not recognized as a security threat; as a result, most stable and long-term-support distributions were left exposed (and still are): Debian 7 (wheezy), Red Hat Enterprise Linux 6 & 7, CentOS 6 & 7, Ubuntu 12.04, for example,” said an advisory from Qualys posted to the OSS-Security mailing list. Respective Linux distributions will be releasing patches; Red Hat has released an update for Red Hat Enterprise Linux v.5 server. Novell has a list of SUSE Linux Enterprise Server builds affected by the vulnerability. Debian has already released an update of its software addressing the vulnerability. “It’s everywhere, which is kind of the urgency we have here. This has been in glibc for a long time. It was fixed recently, but it was not marked as a security issue, so things that are fairly new should be OK,” said Josh Bressers, a member of the Red Hat security response team. “From a threat level, what it comes down to is a handful of stuff that’s probably dangerous that uses this function.” Unlike past Internet-wide bugs such as Bash, patching glibc may not be the chore it was with Bash since so many components made silent Bash calls. “In this instance, you just apply the glibc update, and restart any services that are vulnerable,” Bressers said. “It’s not confusing like Shellshock was.” Qualys, in its advisory, not only shares extremely in-depth technical information on the vulnerability, but also includes a section explaining exploitation of the Exim SMTP mail server. The advisory demonstrates how to bypass NX, or No-eXecute protection as well as glibc malloc hardening, Qualys said. Qualys also said that in addition to the 2013 patch, other factors mitigate the impact of the vulnerability, including the fact that the gethostbyname functions are obsolete because of IPv6 and newer applications using a different call, getaddrinfo(). While the flaw is also exploitable locally, this scenario too is mitigated because many programs rely on gethostbyname only if another preliminary call fails and a secondary call succeeds in order to reach the overflow. The advisory said this is “impossible” and those programs are safe. There are mitigations against remote exploitation too, Qualys said. Servers, for example, use gethostbyname to perform full-circle reverse DNS checks. “These programs are generally safe because the hostname passed to gethostbyname() has normally been pre-validated by DNS software,” the advisory. “It’s not looking like a huge remote problem, right now,” Bressers said. However, while the bug may have been dormant since 2000, there is no way to tell if criminals or government-sponsored hackers have been exploiting this vulnerability. Nor is there any way to tell what will happen once legitimate security researchers—and black hats—begin looking at the vulnerability now that it’s out in the open. With Bash, for example, it didn’t take long for additional security issues to rise to the surface. - See more at: https://threatpost.com/ghost-glibc-remote-code-execution-vulnerability-affects-all-linux-systems/110679#sthash.3JH6GJTL.dpuf -- 白清杰 (Born Bai) Mail: linux...@gmail.com
Re: GHOST glibc Remote Code Execution Vulnerability Affects All Linux Systems - See more at: https://threatpost.com/ghost-glibc-remote-code-execution-vulnerability-affects-all-linux-systems/110679#sth
https://security-tracker.debian.org/tracker/CVE-2015-0235 2015-01-28 18:04 GMT+08:00 linux...@gmail.com : > A critical vulnerability has been found in glibc, the GNU C library, > that affects all Linux systems dating back to 2000. Attackers can use > this flaw to execute code and remotely gain control of Linux machines. > > The issue stems from a heap-based buffer overflow found in the > __nss_hostname_digits_dots() function in glibc. That particular > function is used by the _gethostbyname function calls. > > Related Posts > > Shellshock Worm Exploiting Unpatched QNAP NAS Devices > > December 15, 2014 , 11:35 am > > Linux Modules Connected to Turla APT Discovered > > December 9, 2014 , 10:26 am > > Bash Exploit Reported, First Round of Patches Incomplete > > September 25, 2014 , 11:41 am > > “A remote attacker able to make an application call either of these > functions could use this flaw to execute arbitrary code with the > permissions of the user running the application,” said an advisory > from Linux distributor Red Hat. > > The vulnerability, CVE-2015-0235, has already been nicknamed GHOST > because of its relation to the _gethostbyname function. Researchers at > Qualys discovered the flaw, and say it goes back to glibc version 2.2 > in Linux systems published in November 2000. > > According to Qualys, there is a mitigation for this issue that was > published May 21, 2013 between patch glibc-2.17 versions and > glibc-2.18. > > “Unfortunately, it was not recognized as a security threat; as a > result, most stable and long-term-support distributions were left > exposed (and still are): Debian 7 (wheezy), Red Hat Enterprise Linux 6 > & 7, CentOS 6 & 7, Ubuntu 12.04, for example,” said an advisory from > Qualys posted to the OSS-Security mailing list. > > Respective Linux distributions will be releasing patches; Red Hat has > released an update for Red Hat Enterprise Linux v.5 server. Novell has > a list of SUSE Linux Enterprise Server builds affected by the > vulnerability. Debian has already released an update of its software > addressing the vulnerability. > > “It’s everywhere, which is kind of the urgency we have here. This has > been in glibc for a long time. It was fixed recently, but it was not > marked as a security issue, so things that are fairly new should be > OK,” said Josh Bressers, a member of the Red Hat security response > team. “From a threat level, what it comes down to is a handful of > stuff that’s probably dangerous that uses this function.” > > Unlike past Internet-wide bugs such as Bash, patching glibc may not be > the chore it was with Bash since so many components made silent Bash > calls. > > “In this instance, you just apply the glibc update, and restart any > services that are vulnerable,” Bressers said. “It’s not confusing like > Shellshock was.” > > Qualys, in its advisory, not only shares extremely in-depth technical > information on the vulnerability, but also includes a section > explaining exploitation of the Exim SMTP mail server. The advisory > demonstrates how to bypass NX, or No-eXecute protection as well as > glibc malloc hardening, Qualys said. > > Qualys also said that in addition to the 2013 patch, other factors > mitigate the impact of the vulnerability, including the fact that the > gethostbyname functions are obsolete because of IPv6 and newer > applications using a different call, getaddrinfo(). While the flaw is > also exploitable locally, this scenario too is mitigated because many > programs rely on gethostbyname only if another preliminary call fails > and a secondary call succeeds in order to reach the overflow. The > advisory said this is “impossible” and those programs are safe. > > There are mitigations against remote exploitation too, Qualys said. > Servers, for example, use gethostbyname to perform full-circle reverse > DNS checks. “These programs are generally safe because the hostname > passed to gethostbyname() has normally been pre-validated by DNS > software,” the advisory. > > “It’s not looking like a huge remote problem, right now,” Bressers said. > > However, while the bug may have been dormant since 2000, there is no > way to tell if criminals or government-sponsored hackers have been > exploiting this vulnerability. Nor is there any way to tell what will > happen once legitimate security researchers—and black hats—begin > looking at the vulnerability now that it’s out in the open. With Bash, > for example, it didn’t take long for additional security issues to > rise to the surface. > > - See more at: > https://threatpost.com/ghost-glibc-remote-code-execution-vulnerability-affects-all-linux-systems/110679#sthash.3JH6GJTL.dpuf > > > > > > > -- > 白清杰 (Born Bai) > > Mail: linux...@gmail.com -- 白清杰 (Born Bai) Mail: linux...@gmail.com
Re: GHOST glibc Remote Code Execution Vulnerability Affects All Linux Systems - See more at: https://threatpost.com/ghost-glibc-remote-code-execution-vulnerability-affects-all-linux-systems/110679#sth
thanks Jhon is secur...@cloudstack.apache.org a mail list? how to join it? 2015-01-29 5:05 GMT+08:00 John Kinsella : > FYI the blog post mentioned below now has links to updated SSVM templates. > >> On Jan 28, 2015, at 11:49 AM, John Kinsella wrote: >> >> Folks - just posted mitigation details at [1]. An updated SSVM template is >> being QAed, once released the post will be updated with links and we’ll >> mention here as well. >> >> John >> 1: https://blogs.apache.org/cloudstack/entry/cloudstack_and_the_ghost_glibc >> >> On Jan 28, 2015, at 4:55 AM, Rohit Yadav >> mailto:rohit.ya...@shapeblue.com>> wrote: >> >> Hi, >> >> While it's a general public news, everyone is requested and encouraged >> to use the security mailing list in future to report anything. For more >> details please read: http://cloudstack.apache.org/security.html >> >> Thanks and regards. >> >> On Wednesday 28 January 2015 03:34 PM, >> linux...@gmail.com<mailto:linux...@gmail.com> wrote: >> A critical vulnerability has been found in glibc, the GNU C library, >> that affects all Linux systems dating back to 2000. Attackers can use >> this flaw to execute code and remotely gain control of Linux machines. >> >> The issue stems from a heap-based buffer overflow found in the >> __nss_hostname_digits_dots() function in glibc. That particular >> function is used by the _gethostbyname function calls. >> >> Related Posts >> >> Shellshock Worm Exploiting Unpatched QNAP NAS Devices >> >> December 15, 2014 , 11:35 am >> >> Linux Modules Connected to Turla APT Discovered >> >> December 9, 2014 , 10:26 am >> >> Bash Exploit Reported, First Round of Patches Incomplete >> >> September 25, 2014 , 11:41 am >> >> “A remote attacker able to make an application call either of these >> functions could use this flaw to execute arbitrary code with the >> permissions of the user running the application,” said an advisory >> from Linux distributor Red Hat. >> >> The vulnerability, CVE-2015-0235, has already been nicknamed GHOST >> because of its relation to the _gethostbyname function. Researchers at >> Qualys discovered the flaw, and say it goes back to glibc version 2.2 >> in Linux systems published in November 2000. >> >> According to Qualys, there is a mitigation for this issue that was >> published May 21, 2013 between patch glibc-2.17 versions and >> glibc-2.18. >> >> “Unfortunately, it was not recognized as a security threat; as a >> result, most stable and long-term-support distributions were left >> exposed (and still are): Debian 7 (wheezy), Red Hat Enterprise Linux 6 >> & 7, CentOS 6 & 7, Ubuntu 12.04, for example,” said an advisory from >> Qualys posted to the OSS-Security mailing list. >> >> Respective Linux distributions will be releasing patches; Red Hat has >> released an update for Red Hat Enterprise Linux v.5 server. Novell has >> a list of SUSE Linux Enterprise Server builds affected by the >> vulnerability. Debian has already released an update of its software >> addressing the vulnerability. >> >> “It’s everywhere, which is kind of the urgency we have here. This has >> been in glibc for a long time. It was fixed recently, but it was not >> marked as a security issue, so things that are fairly new should be >> OK,” said Josh Bressers, a member of the Red Hat security response >> team. “From a threat level, what it comes down to is a handful of >> stuff that’s probably dangerous that uses this function.” >> >> Unlike past Internet-wide bugs such as Bash, patching glibc may not be >> the chore it was with Bash since so many components made silent Bash >> calls. >> >> “In this instance, you just apply the glibc update, and restart any >> services that are vulnerable,” Bressers said. “It’s not confusing like >> Shellshock was.” >> >> Qualys, in its advisory, not only shares extremely in-depth technical >> information on the vulnerability, but also includes a section >> explaining exploitation of the Exim SMTP mail server. The advisory >> demonstrates how to bypass NX, or No-eXecute protection as well as >> glibc malloc hardening, Qualys said. >> >> Qualys also said that in addition to the 2013 patch, other factors >> mitigate the impact of the vulnerability, including the fact that the >> gethostbyname functions are obsolete because of IPv6 and newer >> applications using a different call, getaddrinfo(). While the flaw is >> also exploitabl