Re: [ovirt-users] Import Virtual Machines From Web Admin GUI

--_000_29F6DFB5D9F542A2BD298B2445D5384Dingramcontentcom_ Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: base64 VG8gYW5zd2VyIG15IG93biBxdWVzdGlvbjogYXMgaXMgb2Z0ZW4gdGhlIGNhc2UsIHBlcnVzaW5n IHRoZSBjb21tZXJjaWFsIChSSFYgNC4wKSBkb2N1bWVudGF0aW9uIHByb3ZlZCB1c2VmdWwuDQoN ClRoZSBkb2N1bWVudGF0aW9uIGlzIGhlcmU6DQpodHRwczovL2FjY2Vzcy5yZWRoYXQuY29tL2Rv Y3VtZW50YXRpb24vZW4vcmVkLWhhdC12aXJ0dWFsaXphdGlvbi80LjAvcGFnZWQvdmlydHVhbC1t YWNoaW5lLW1hbmFnZW1lbnQtZ3VpZGUvNjEyLWV4cG9ydGluZy1hbmQtaW1wb3J0aW5nLXZpcnR1 YWwtbWFjaGluZXMtYW5kLXRlbXBsYXRlcw0KDQpIb3dldmVyLCBJIGtlcHQgZ2V0dGluZyB0aGUg ZXJyb3Ig4oCcSG9zdCBrZXkgdmVyaWZpY2F0aW9uIGZhaWxlZC46IENvbm5lY3Rpb24gcmVzZXQg YnkgcGVlcuKAnS4gVGhpcyBkZXNwaXRlIGhhdmluZyBmb2xsb3dlZCB0aGUgb2ZmaWNpYWwgZG9j dW1lbnRhdGlvbiBvbiBnZW5lcmF0aW5nIGFuZCBjb3B5aW5nIGtleXMsIHVuZGVyIFByb2NlZHVy ZSA2LjIuNiBJbXBvcnRpbmcgYSBWaXJ0dWFsIE1hY2hpbmUgZnJvbSBLVk0uDQoNClRoZW4gSSBm b3VuZCB0aGlzIGFydGljbGUgZnJvbSBKdWx5IDIwMTIgYWJvdXQgYSBkaWZmZXJlbnQgKGJ1dCBz aW1pbGFyKSBzY2VuYXJpbzoNCg0KaHR0cHM6Ly9hY2Nlc3MucmVkaGF0LmNvbS9zb2x1dGlvbnMv MTM2NDYzDQoNCldoYXQgaGVscGVkIHdhcyB0aGUg4oCcYWx0ZXJuYXRpdmUgdGVzdOKAnSBzdWdn ZXN0aW9uLiBIZXJlIGlzIHRoZSBVUkkgSSBlbmRlZCB1cCB1c2luZyB3aXRoIHN1Y2Nlc3M6DQoN CnFlbXUrc3NoOi8vcm9vdEBNWV9LVk1fSE9TVC9zeXN0ZW0/bm9fdmVyaWZ5PTENCg0KQXBwZW5k aW5nIOKAnG5vX3ZlcmlmeT0x4oCdIGRpZCB0aGUgdHJpY2suIEl04oCZcyBwb3NzaWJsZSB0aGF0 IGFkZGluZyBob3N0bmFtZXMgYW5kIElQcyB0byAvZXRjL2hvc3RzIHdvdWxkIGhhdmUgYWxzbyBy ZXNvbHZlZCB0aGlzLCBidXQgZm9yIHNvbWV0aGluZyBwZXJmb3JtZWQgaW5mcmVxdWVudGx5IChp bXBvcnRpbmcgYSBWTSBmcm9tIGFub3RoZXIgZW52aXJvbm1lbnQpLCBtb2RpZnlpbmcgdGhlIFVS SSBpcyBlYXNpZXIuDQoNCkJlc3QsDQpEYW5pZWwNCg0KRnJvbTogPHVzZXJzLWJvdW5jZXNAb3Zp cnQub3JnPiBvbiBiZWhhbGYgb2YgIkJlY2ttYW4sIERhbmllbCIgPERhbmllbC5CZWNrbWFuQGlu Z3JhbWNvbnRlbnQuY29tPg0KRGF0ZTogVHVlc2RheSwgSmFudWFyeSAzLCAyMDE3IGF0IDk6NTgg QU0NClRvOiAidXNlcnNAb3ZpcnQub3JnIiA8dXNlcnNAb3ZpcnQub3JnPg0KU3ViamVjdDogW292 aXJ0LXVzZXJzXSBJbXBvcnQgVmlydHVhbCBNYWNoaW5lcyBGcm9tIFdlYiBBZG1pbiBHVUkNCg0K Q2FuIGFueW9uZSBwb2ludCBtZSB0byBhIHN0ZXAtYnktc3RlcCBndWlkZSBvbiBnZXR0aW5nIGFu IGltcG9ydCAoc2F5LCBmcm9tIEtWTSkgdG8gd29yaz8gSSBnYXRoZXIgaXQgaW52b2x2ZXMgc29t ZSBzaGFyaW5nIG9mIFNTSCBrZXlzIGJ1dCBJIGhhdmVu4oCZdCBzZWVuIGl0IGV4cGxhaW5lZCBp biBkZXRhaWwuIFNwZWNpZmljYWxseSwgd2hhdCB1c2VyIG5lZWRzIHRvIHRydXN0IHdoYXQga2V5 cyBvbiB3aGljaCBtYWNoaW5lcz8gVGhlIGh5cGVydmlzb3IgaG9zdHM/IFRoZSBtYWNoaW5lIHJ1 bm5pbmcgdGhlIGVuZ2luZT8gQWxzbywgc29tZSBleGFtcGxlcyBvZiBVUkkgcGF0aHMgd291bGQg YmUgbXVjaCBhcHByZWNpYXRlZC4NCg0KVGhhbmtzLA0KRGFuaWVsDQo= --_000_29F6DFB5D9F542A2BD298B2445D5384Dingramcontentcom_ Content-Type: text/html; charset=UTF-8 Content-ID: <AF60B5926F31864C80F59FC37860BD67@namprd12.prod.outlook.com> Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6bz0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6b2ZmaWNlIiB4 bWxuczp3PSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmljZTp3b3JkIiB4bWxuczptPSJo dHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL29mZmljZS8yMDA0LzEyL29tbWwiIHhtbG5zPSJo dHRwOi8vd3d3LnczLm9yZy9UUi9SRUMtaHRtbDQwIj4NCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVp dj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9dXRmLTgiPg0KPG1l dGEgbmFtZT0iVGl0bGUiIGNvbnRlbnQ9IiI+DQo8bWV0YSBuYW1lPSJLZXl3b3JkcyIgY29udGVu dD0iIj4NCjxtZXRhIG5hbWU9IkdlbmVyYXRvciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUg KGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxlPjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8N CkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0 IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJ cGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAyIDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8N CnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWwsIGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBpbjsN CgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJZm9udC1zaXplOjEyLjBwdDsNCglmb250LWZhbWls eTpDYWxpYnJpO30NCmE6bGluaywgc3Bhbi5Nc29IeXBlcmxpbmsNCgl7bXNvLXN0eWxlLXByaW9y aXR5Ojk5Ow0KCWNvbG9yOiMwNTYzQzE7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQph OnZpc2l0ZWQsIHNwYW4uTXNvSHlwZXJsaW5rRm9sbG93ZWQNCgl7bXNvLXN0eWxlLXByaW9yaXR5 Ojk5Ow0KCWNvbG9yOiM5NTRGNzI7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwcmUN Cgl7bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJIVE1MIFByZWZvcm1h dHRlZCBDaGFyIjsNCgltYXJnaW46MGluOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250 LXNpemU6MTAuMHB0Ow0KCWZvbnQtZmFtaWx5OkNvdXJpZXI7fQ0Kc3Bhbi5FbWFpbFN0eWxlMTcN Cgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWw7DQoJZm9udC1mYW1pbHk6Q2FsaWJyaTsNCgljb2xv cjp3aW5kb3d0ZXh0O30NCnNwYW4uRW1haWxTdHlsZTE4DQoJe21zby1zdHlsZS10eXBlOnBlcnNv bmFsLXJlcGx5Ow0KCWZvbnQtZmFtaWx5OkNhbGlicmk7DQoJY29sb3I6d2luZG93dGV4dDt9DQpz cGFuLkhUTUxQcmVmb3JtYXR0ZWRDaGFyDQoJe21zby1zdHlsZS1uYW1lOiJIVE1MIFByZWZvcm1h dHRlZCBDaGFyIjsNCgltc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJbXNvLXN0eWxlLWxpbms6IkhU TUwgUHJlZm9ybWF0dGVkIjsNCglmb250LWZhbWlseTpDb3VyaWVyO30NCnNwYW4ubXNvSW5zDQoJ e21zby1zdHlsZS10eXBlOmV4cG9ydC1vbmx5Ow0KCW1zby1zdHlsZS1uYW1lOiIiOw0KCXRleHQt ZGVjb3JhdGlvbjp1bmRlcmxpbmU7DQoJY29sb3I6dGVhbDt9DQouTXNvQ2hwRGVmYXVsdA0KCXtt c28tc3R5bGUtdHlwZTpleHBvcnQtb25seTsNCglmb250LXNpemU6MTAuMHB0O30NCkBwYWdlIFdv cmRTZWN0aW9uMQ0KCXtzaXplOjguNWluIDExLjBpbjsNCgltYXJnaW46MS4waW4gMS4waW4gMS4w aW4gMS4waW47fQ0KZGl2LldvcmRTZWN0aW9uMQ0KCXtwYWdlOldvcmRTZWN0aW9uMTt9DQotLT48 L3N0eWxlPg0KPC9oZWFkPg0KPGJvZHkgYmdjb2xvcj0id2hpdGUiIGxhbmc9IkVOLVVTIiBsaW5r PSIjMDU2M0MxIiB2bGluaz0iIzk1NEY3MiI+DQo8ZGl2IGNsYXNzPSJXb3JkU2VjdGlvbjEiPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQiPlRvIGFu c3dlciBteSBvd24gcXVlc3Rpb246IGFzIGlzIG9mdGVuIHRoZSBjYXNlLCBwZXJ1c2luZyB0aGUg Y29tbWVyY2lhbCAoUkhWIDQuMCkgZG9jdW1lbnRhdGlvbiBwcm92ZWQgdXNlZnVsLg0KPG86cD48 L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQt c2l6ZToxMS4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29O b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0Ij5UaGUgZG9jdW1lbnRhdGlvbiBp cyBoZXJlOjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0Ij48YSBocmVmPSJodHRwczovL2FjY2Vzcy5yZWRoYXQu Y29tL2RvY3VtZW50YXRpb24vZW4vcmVkLWhhdC12aXJ0dWFsaXphdGlvbi80LjAvcGFnZWQvdmly dHVhbC1tYWNoaW5lLW1hbmFnZW1lbnQtZ3VpZGUvNjEyLWV4cG9ydGluZy1hbmQtaW1wb3J0aW5n LXZpcnR1YWwtbWFjaGluZXMtYW5kLXRlbXBsYXRlcyI+aHR0cHM6Ly9hY2Nlc3MucmVkaGF0LmNv bS9kb2N1bWVudGF0aW9uL2VuL3JlZC1oYXQtdmlydHVhbGl6YXRpb24vNC4wL3BhZ2VkL3ZpcnR1 YWwtbWFjaGluZS1tYW5hZ2VtZW50LWd1aWRlLzYxMi1leHBvcnRpbmctYW5kLWltcG9ydGluZy12 aXJ0dWFsLW1hY2hpbmVzLWFuZC10ZW1wbGF0ZXM8L2E+PG86cD48L286cD48L3NwYW4+PC9wPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQiPjxvOnA+ Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl PSJmb250LXNpemU6MTEuMHB0Ij5Ib3dldmVyLCBJIGtlcHQgZ2V0dGluZyB0aGUgZXJyb3Ig4oCc SG9zdCBrZXkgdmVyaWZpY2F0aW9uIGZhaWxlZC46IENvbm5lY3Rpb24gcmVzZXQgYnkgcGVlcuKA nS4gVGhpcyBkZXNwaXRlIGhhdmluZyBmb2xsb3dlZCB0aGUgb2ZmaWNpYWwgZG9jdW1lbnRhdGlv biBvbiBnZW5lcmF0aW5nIGFuZCBjb3B5aW5nIGtleXMsIHVuZGVyDQo8aT5Qcm9jZWR1cmUgNi4y LjYgSW1wb3J0aW5nIGEgVmlydHVhbCBNYWNoaW5lIGZyb20gS1ZNPC9pPi48bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEx LjBwdCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQiPlRoZW4gSSBmb3VuZCB0aGlzIGFydGljbGUg ZnJvbSBKdWx5IDIwMTIgYWJvdXQgYSBkaWZmZXJlbnQgKGJ1dCBzaW1pbGFyKSBzY2VuYXJpbzo8 bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i Zm9udC1zaXplOjExLjBwdCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9 Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQiPjxhIGhyZWY9Imh0dHBz Oi8vYWNjZXNzLnJlZGhhdC5jb20vc29sdXRpb25zLzEzNjQ2MyI+aHR0cHM6Ly9hY2Nlc3MucmVk aGF0LmNvbS9zb2x1dGlvbnMvMTM2NDYzPC9hPjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNs YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0Ij48bzpwPiZuYnNw OzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u dC1zaXplOjExLjBwdCI+V2hhdCBoZWxwZWQgd2FzIHRoZSDigJxhbHRlcm5hdGl2ZSB0ZXN04oCd IHN1Z2dlc3Rpb24uIEhlcmUgaXMgdGhlIFVSSSBJIGVuZGVkIHVwIHVzaW5nIHdpdGggc3VjY2Vz czo8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls ZT0iZm9udC1zaXplOjExLjBwdCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xh c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQiPnFlbXUmIzQzO3Nz aDovL3Jvb3RATVlfS1ZNX0hPU1Qvc3lzdGVtP25vX3ZlcmlmeT0xPG86cD48L286cD48L3NwYW4+ PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQi PjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0Ij5BcHBlbmRpbmcg4oCcbm9fdmVyaWZ5PTHigJ0gZGlk IHRoZSB0cmljay4gSXTigJlzIHBvc3NpYmxlIHRoYXQgYWRkaW5nIGhvc3RuYW1lcyBhbmQgSVBz IHRvIC9ldGMvaG9zdHMgd291bGQgaGF2ZSBhbHNvIHJlc29sdmVkIHRoaXMsIGJ1dCBmb3Igc29t ZXRoaW5nIHBlcmZvcm1lZCBpbmZyZXF1ZW50bHkgKGltcG9ydGluZyBhIFZNIGZyb20gYW5vdGhl ciBlbnZpcm9ubWVudCksDQogbW9kaWZ5aW5nIHRoZSBVUkkgaXMgZWFzaWVyLiA8bzpwPjwvbzpw Pjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1h bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQiPkJlc3QsPG86cD48L286cD48L3NwYW4+ PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQi PkRhbmllbDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8 ZGl2IHN0eWxlPSJib3JkZXI6bm9uZTtib3JkZXItdG9wOnNvbGlkICNCNUM0REYgMS4wcHQ7cGFk ZGluZzozLjBwdCAwaW4gMGluIDBpbiI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48Yj48c3BhbiBz dHlsZT0iY29sb3I6YmxhY2siPkZyb206IDwvc3Bhbj48L2I+PHNwYW4gc3R5bGU9ImNvbG9yOmJs YWNrIj4mbHQ7dXNlcnMtYm91bmNlc0BvdmlydC5vcmcmZ3Q7IG9uIGJlaGFsZiBvZiAmcXVvdDtC ZWNrbWFuLCBEYW5pZWwmcXVvdDsgJmx0O0RhbmllbC5CZWNrbWFuQGluZ3JhbWNvbnRlbnQuY29t Jmd0Ozxicj4NCjxiPkRhdGU6IDwvYj5UdWVzZGF5LCBKYW51YXJ5IDMsIDIwMTcgYXQgOTo1OCBB TTxicj4NCjxiPlRvOiA8L2I+JnF1b3Q7dXNlcnNAb3ZpcnQub3JnJnF1b3Q7ICZsdDt1c2Vyc0Bv dmlydC5vcmcmZ3Q7PGJyPg0KPGI+U3ViamVjdDogPC9iPltvdmlydC11c2Vyc10gSW1wb3J0IFZp cnR1YWwgTWFjaGluZXMgRnJvbSBXZWIgQWRtaW4gR1VJPG86cD48L286cD48L3NwYW4+PC9wPg0K PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtZmFt aWx5OiZxdW90O1RpbWVzIE5ldyBSb21hbiZxdW90OyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+ PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjExLjBwdCI+Q2FuIGFueW9uZSBwb2ludCBtZSB0byBhIHN0ZXAtYnktc3RlcCBndWlkZSBvbiBn ZXR0aW5nIGFuIGltcG9ydCAoc2F5LCBmcm9tIEtWTSkgdG8gd29yaz8gSSBnYXRoZXIgaXQgaW52 b2x2ZXMgc29tZSBzaGFyaW5nIG9mIFNTSCBrZXlzIGJ1dCBJIGhhdmVu4oCZdCBzZWVuIGl0IGV4 cGxhaW5lZCBpbiBkZXRhaWwuIFNwZWNpZmljYWxseSwgd2hhdCB1c2VyIG5lZWRzDQogdG8gdHJ1 c3Qgd2hhdCBrZXlzIG9uIHdoaWNoIG1hY2hpbmVzPyBUaGUgaHlwZXJ2aXNvciBob3N0cz8gVGhl IG1hY2hpbmUgcnVubmluZyB0aGUgZW5naW5lPyBBbHNvLCBzb21lIGV4YW1wbGVzIG9mIFVSSSBw YXRocyB3b3VsZCBiZSBtdWNoIGFwcHJlY2lhdGVkLg0KPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQiPiZuYnNw Ozwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl PSJmb250LXNpemU6MTEuMHB0Ij5UaGFua3MsPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xh c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQiPkRhbmllbDwvc3Bh bj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K --_000_29F6DFB5D9F542A2BD298B2445D5384Dingramcontentcom_--

Hi, you can try to exchange the keys shown here: https://www.ovirt.org/develop/release-management/features/virt/XenToOvirt/ if you want to use tcp without ssh look here: http://wiki.libvirt.org/page/Libvirt_daemon_is_not_listening_on_tcp_ports_al... basically you need to set * /etc/libvirtd.conf: listen_tls = 1 listen_tcp = 1 listen_addr = "0.0.0.0" * /etc/sysconfig/libvirtd: LIBVIRTD_ARGS="--listen" and restart libvirt but the no_verify you did works as well. On Wed, Jan 4, 2017 at 12:07 AM, Beckman, Daniel < Daniel.Beckman@ingramcontent.com> wrote:
To answer my own question: as is often the case, perusing the commercial (RHV 4.0) documentation proved useful.
The documentation is here:
https://access.redhat.com/documentation/en/red-hat- virtualization/4.0/paged/virtual-machine-management- guide/612-exporting-and-importing-virtual-machines-and-templates
However, I kept getting the error “Host key verification failed.: Connection reset by peer”. This despite having followed the official documentation on generating and copying keys, under *Procedure 6.2.6 Importing a Virtual Machine from KVM*.
Then I found this article from July 2012 about a different (but similar) scenario:
https://access.redhat.com/solutions/136463
What helped was the “alternative test” suggestion. Here is the URI I ended up using with success:
qemu+ssh://root@MY_KVM_HOST/system?no_verify=1
Appending “no_verify=1” did the trick. It’s possible that adding hostnames and IPs to /etc/hosts would have also resolved this, but for something performed infrequently (importing a VM from another environment), modifying the URI is easier.
Best,
Daniel
*From: *<users-bounces@ovirt.org> on behalf of "Beckman, Daniel" < Daniel.Beckman@ingramcontent.com> *Date: *Tuesday, January 3, 2017 at 9:58 AM *To: *"users@ovirt.org" <users@ovirt.org> *Subject: *[ovirt-users] Import Virtual Machines From Web Admin GUI
Can anyone point me to a step-by-step guide on getting an import (say, from KVM) to work? I gather it involves some sharing of SSH keys but I haven’t seen it explained in detail. Specifically, what user needs to trust what keys on which machines? The hypervisor hosts? The machine running the engine? Also, some examples of URI paths would be much appreciated.
Thanks,
Daniel
_______________________________________________ Users mailing list Users@ovirt.org http://lists.ovirt.org/mailman/listinfo/users

Hi, I'm sort of puzzled why you still saw "Host key verification failed" if you followed the procedure (or the steps described in [1]). Only thing I can think of is that you used IP of the KVM host during the procedure but then you used hostname in the URL (in import dialog). Another possible problem could be that there were two conflicting host keys in known_hosts file. But I believe adding "no_verify=1" would not help in this case. Tomas On Tue, 3 Jan 2017 22:07:42 +0000 "Beckman, Daniel" <Daniel.Beckman@ingramcontent.com> wrote:
To answer my own question: as is often the case, perusing the commercial (RHV 4.0) documentation proved useful.
The documentation is here: https://access.redhat.com/documentation/en/red-hat-virtualization/4.0/paged/...
However, I kept getting the error “Host key verification failed.: Connection reset by peer”. This despite having followed the official documentation on generating and copying keys, under Procedure 6.2.6 Importing a Virtual Machine from KVM.
Then I found this article from July 2012 about a different (but similar) scenario:
https://access.redhat.com/solutions/136463
What helped was the “alternative test” suggestion. Here is the URI I ended up using with success:
qemu+ssh://root@MY_KVM_HOST/system?no_verify=1
Appending “no_verify=1” did the trick. It’s possible that adding hostnames and IPs to /etc/hosts would have also resolved this, but for something performed infrequently (importing a VM from another environment), modifying the URI is easier.
Best, Daniel
From: <users-bounces@ovirt.org> on behalf of "Beckman, Daniel" <Daniel.Beckman@ingramcontent.com> Date: Tuesday, January 3, 2017 at 9:58 AM To: "users@ovirt.org" <users@ovirt.org> Subject: [ovirt-users] Import Virtual Machines From Web Admin GUI
Can anyone point me to a step-by-step guide on getting an import (say, from KVM) to work? I gather it involves some sharing of SSH keys but I haven’t seen it explained in detail. Specifically, what user needs to trust what keys on which machines? The hypervisor hosts? The machine running the engine? Also, some examples of URI paths would be much appreciated.
Thanks, Daniel
-- Tomáš Golembiovský <tgolembi@redhat.com>

Forgot to attach the link. On Thu, 5 Jan 2017 17:01:59 +0100 Tomáš Golembiovský <tgolembi@redhat.com> wrote:
Hi,
I'm sort of puzzled why you still saw "Host key verification failed" if you followed the procedure (or the steps described in [1]).
[1] https://www.ovirt.org/develop/release-management/features/virt/XenToOvirt/
Only thing I can think of is that you used IP of the KVM host during the procedure but then you used hostname in the URL (in import dialog).
Another possible problem could be that there were two conflicting host keys in known_hosts file. But I believe adding "no_verify=1" would not help in this case.
-- Tomáš Golembiovský <tgolembi@redhat.com>

I indeed followed that procedure, including confirming I could SSH into the KVM host as user ‘vdsm’ without being prompted for a password. I had specified the host name of the KVM host, not the IP (though at one point I also tried the IP, with same results.) I was curious so on the KVM (source) host I added entries in /etc/hosts for all of the hypervisors in oVirt, along with the oVirt engine host for good measure (probably not necessary). I tried another import, this time withouth the “no_verify=1” and it worked without error. Our internal DNS works – all of the hosts were able to correctly resolve addresses prior to me editing /etc/hosts. But I guess something in that process does not query DNS. Anyway, at least that’s a cleaner solution than removing verification. Thanks, Daniel On 1/5/17, 10:01 AM, "Tomáš Golembiovský" <tgolembi@redhat.com> wrote: Hi, I'm sort of puzzled why you still saw "Host key verification failed" if you followed the procedure (or the steps described in [1]). https://www.ovirt.org/develop/release-management/features/virt/XenToOvirt/ Only thing I can think of is that you used IP of the KVM host during the procedure but then you used hostname in the URL (in import dialog). Another possible problem could be that there were two conflicting host keys in known_hosts file. But I believe adding "no_verify=1" would not help in this case. Tomas On Tue, 3 Jan 2017 22:07:42 +0000 "Beckman, Daniel" <Daniel.Beckman@ingramcontent.com> wrote: > To answer my own question: as is often the case, perusing the commercial (RHV 4.0) documentation proved useful. > > The documentation is here: > https://access.redhat.com/documentation/en/red-hat-virtualization/4.0/paged/... > > However, I kept getting the error “Host key verification failed.: Connection reset by peer”. This despite having followed the official documentation on generating and copying keys, under Procedure 6.2.6 Importing a Virtual Machine from KVM. > > Then I found this article from July 2012 about a different (but similar) scenario: > > https://access.redhat.com/solutions/136463 > > What helped was the “alternative test” suggestion. Here is the URI I ended up using with success: > > qemu+ssh://root@MY_KVM_HOST/system?no_verify=1 > > Appending “no_verify=1” did the trick. It’s possible that adding hostnames and IPs to /etc/hosts would have also resolved this, but for something performed infrequently (importing a VM from another environment), modifying the URI is easier. > > Best, > Daniel > > From: <users-bounces@ovirt.org> on behalf of "Beckman, Daniel" <Daniel.Beckman@ingramcontent.com> > Date: Tuesday, January 3, 2017 at 9:58 AM > To: "users@ovirt.org" <users@ovirt.org> > Subject: [ovirt-users] Import Virtual Machines From Web Admin GUI > > Can anyone point me to a step-by-step guide on getting an import (say, from KVM) to work? I gather it involves some sharing of SSH keys but I haven’t seen it explained in detail. Specifically, what user needs to trust what keys on which machines? The hypervisor hosts? The machine running the engine? Also, some examples of URI paths would be much appreciated. > > Thanks, > Daniel -- Tomáš Golembiovský <tgolembi@redhat.com>
participants (3)
-
Beckman, Daniel
-
Shahar Havivi
-
Tomáš Golembiovský