Dears, I have the same problem, but another one error:
On my pre-production stand with one node in cluster, I was set hode to 
maintenance, and after try update cluster to 4.5 i see: Error while executing 
action: Cannot change Cluster compatibility version where there are no hosts in 
the Cluster which support that version.

ENGINE LOG: 2020-12-11 15:48:26,338+02 INFO  
[org.ovirt.engine.core.bll.UpdateClusterCommand] (default task-1) 
[383d1f09-039d-4737-9e8d-9b2490717bd8] Updating cluster CPU flags and verb 
according to the configuration of the Intel Westmere Family cpu
2020-12-11 15:48:26,347+02 INFO  
[org.ovirt.engine.core.bll.UpdateClusterCommand] (default task-1) 
[383d1f09-039d-4737-9e8d-9b2490717bd8] Lock Acquired to object 
'EngineLock:{exclusiveLocks='[]', 
sharedLocks='[9abc1d61-829e-470b-b6c8-ad5aec769869=VM]'}'
2020-12-11 15:48:26,389+02 WARN  
[org.ovirt.engine.core.bll.UpdateClusterCommand] (default task-1) 
[383d1f09-039d-4737-9e8d-9b2490717bd8] Validation of action 'UpdateCluster' 
failed for user smelnyk@internal-authz. Reasons: 
VAR__TYPE__CLUSTER,VAR__ACTION__UPDATE,CLUSTER_CANNOT_UPDATE_VERSION_WHEN_NO_HOST_SUPPORTS_THE_VERSION
2020-12-11 15:48:26,390+02 INFO  
[org.ovirt.engine.core.bll.UpdateClusterCommand] (default task-1) 
[383d1f09-039d-4737-9e8d-9b2490717bd8] Lock freed to object 
'EngineLock:{exclusiveLocks='[]', 
sharedLocks='[9abc1d61-829e-470b-b6c8-ad5aec769869=VM]'}'


HOST:
OS Version:
RHEL - 8.3 - 1.2011.el8
OS Description:
CentOS Linux 8
Kernel Version:
4.18.0 - 240.1.1.el8_3.x86_64
KVM Version:
4.2.0 - 34.module_el8.3.0+555+a55c8938
LIBVIRT Version:
libvirt-6.0.0-28.module_el8.3.0+555+a55c8938
VDSM Version:
vdsm-4.40.35.1-1.el8
SPICE Version:
0.14.3 - 3.el8
GlusterFS Version:
[N/A]
CEPH Version:
librbd1-12.2.7-9.el8
Open vSwitch Version:
[N/A]
Nmstate Version:
nmstate-0.3.6-2.el8
Kernel Features:
MDS: (Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable), 
L1TF: (Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT 
vulnerable), SRBDS: (Not affected), MELTDOWN: (Mitigation: PTI), SPECTRE_V1: 
(Mitigation: usercopy/swapgs barriers and __user pointer sanitization), 
SPECTRE_V2: (Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, 
STIBP: conditional, RSB filling), ITLB_MULTIHIT: (KVM: Mitigation: Split huge 
pages), TSX_ASYNC_ABORT: (Not affected), SPEC_STORE_BYPASS: (Mitigation: 
Speculative Store Bypass disabled via prctl and seccomp)
VNC Encryption:
Disabled
FIPS mode enabled:
Disabled 
_______________________________________________
Users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Privacy Statement: https://www.ovirt.org/privacy-policy.html
oVirt Code of Conduct: 
https://www.ovirt.org/community/about/community-guidelines/
List Archives: 
https://lists.ovirt.org/archives/list/[email protected]/message/EN3OFPDS4N2UAPHT2TT7MFT2EXHP4AUM/

Reply via email to