RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1816034 - Migration failing due to "Internal error: Missing essential config entry 'ide0:0.fileName'" [rhel-7.7.z]
Summary: Migration failing due to "Internal error: Missing essential config entry 'ide...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: libvirt
Version: 7.7
Hardware: Unspecified
OS: Unspecified
urgent
urgent
Target Milestone: rc
: ---
Assignee: Pino Toscano
QA Contact: gaojianan
URL:
Whiteboard:
Depends On: 1815269
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-03-23 08:18 UTC by RAD team bot copy to z-stream
Modified: 2023-09-07 22:30 UTC (History)
20 users (show)

Fixed In Version: libvirt-4.5.0-23.el7_7.7
Doc Type: If docs needed, set a value
Doc Text:
Clone Of: 1815269
Environment:
Last Closed: 2020-04-30 17:17:13 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2020:1993 0 None None None 2020-04-30 17:17:16 UTC

Description RAD team bot copy to z-stream 2020-03-23 08:18:33 UTC
This bug has been copied from bug #1815269 and has been proposed to be backported to 7.7 z-stream (EUS).

Comment 10 gaojianan 2020-03-24 09:01:35 UTC
Verified on libvirt version:
libvirt-4.5.0-23.el7_7.7.x86_64

Step:
Scenario 1:Convert the xml without cdrom source disk
1. connect to esx driver, and convert the attached vmware-vmx file to domain XML  format(The file b.vmx is in the attachment)
# virsh -c 'esx://root.75.219?no_verify=1' domxml-from-native vmware-vmx b.vmx
2020-03-24 08:10:27.218+0000: 18501: info : libvirt version: 4.5.0, package: 23.el7_7.7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2020-03-23-08:54:57, x86-vm-26.build.eng.bos.redhat.com)
2020-03-24 08:10:27.218+0000: 18501: info : hostname: dell-per730-66.lab.eng.pek2.redhat.com
2020-03-24 08:10:27.218+0000: 18501: warning : esxConnectOpen:857 : Ignoring unexpected path '' for non-vpx scheme 'esx'
Enter root's password for 10.73.75.219: 
<domain type='vmware'>
  <name>T999-VPQB01</name>
  <uuid>9780d227-32b1-4dc8-ad95-1b031602e7ef</uuid>
  <memory unit='KiB'>4194304</memory>
  <currentMemory unit='KiB'>4194304</currentMemory>
  <vcpu placement='static'>2</vcpu>
  <cputune>
    <shares>2000</shares>
  </cputune>
  <os>
    <type arch='x86_64'>hvm</type>
  </os>
  <cpu>
    <topology sockets='1' cores='2' threads='1'/>
  </cpu>
  <clock offset='utc'/>
  <on_poweroff>destroy</on_poweroff>
  <on_reboot>restart</on_reboot>
  <on_crash>destroy</on_crash>
  <devices>
    <disk type='file' device='disk'>
      <source file='[?] ?/A000-VPQB01_3.vmdk'/>
      <target dev='sda' bus='scsi'/>
      <address type='drive' controller='0' bus='0' target='0' unit='0'/>
    </disk>
    <disk type='file' device='disk'>
      <source file='[?] ?/A000-VPQB01_2.vmdk'/>
      <target dev='sdb' bus='scsi'/>
      <address type='drive' controller='0' bus='0' target='0' unit='1'/>
    </disk>
    <disk type='block' device='cdrom'>
      <target dev='hda' bus='ide'/>
      <address type='drive' controller='0' bus='0' target='0' unit='0'/>
    </disk>
    <controller type='scsi' index='0' model='lsisas1068'/>
    <controller type='ide' index='0'/>
    <interface type='bridge'>
      <mac address='00:50:56:be:9b:0b'/>
      <source bridge='VM Network'/>
      <model type='e1000'/>
    </interface>
    <video>
      <model type='vmvga' vram='4096' primary='yes'/>
    </video>
  </devices>
</domain>

conversion succeed.

Scenario 2:Convert the xml with cdrom source disk
Add ide0:0.filename = "mydisk.vhd" to b.vmx
# virsh -c 'esx://root.75.219?no_verify=1' domxml-from-native vmware-vmx b.vmx
2020-03-24 09:00:07.812+0000: 35294: info : libvirt version: 4.5.0, package: 23.el7_7.7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2020-03-23-08:54:57, x86-vm-26.build.eng.bos.redhat.com)
2020-03-24 09:00:07.812+0000: 35294: info : hostname: dell-per730-66.lab.eng.pek2.redhat.com
2020-03-24 09:00:07.812+0000: 35294: warning : esxConnectOpen:857 : Ignoring unexpected path '' for non-vpx scheme 'esx'
Enter root's password for 10.73.75.219: 
<domain type='vmware'>
  <name>T999-VPQB01</name>
  <uuid>9780d227-32b1-4dc8-ad95-1b031602e7ef</uuid>
  <memory unit='KiB'>4194304</memory>
  <currentMemory unit='KiB'>4194304</currentMemory>
  <vcpu placement='static'>2</vcpu>
  <cputune>
    <shares>2000</shares>
  </cputune>
  <os>
    <type arch='x86_64'>hvm</type>
  </os>
  <cpu>
    <topology sockets='1' cores='2' threads='1'/>
  </cpu>
  <clock offset='utc'/>
  <on_poweroff>destroy</on_poweroff>
  <on_reboot>restart</on_reboot>
  <on_crash>destroy</on_crash>
  <devices>
    <disk type='file' device='disk'>
      <source file='[?] ?/A000-VPQB01_3.vmdk'/>
      <target dev='sda' bus='scsi'/>
      <address type='drive' controller='0' bus='0' target='0' unit='0'/>
    </disk>
    <disk type='file' device='disk'>
      <source file='[?] ?/A000-VPQB01_2.vmdk'/>
      <target dev='sdb' bus='scsi'/>
      <address type='drive' controller='0' bus='0' target='0' unit='1'/>
    </disk>
    <disk type='block' device='cdrom'>
      <source dev='mydisk.vhd'/>
      <target dev='hda' bus='ide'/>
      <address type='drive' controller='0' bus='0' target='0' unit='0'/>
    </disk>
    <controller type='scsi' index='0' model='lsisas1068'/>
    <controller type='ide' index='0'/>
    <interface type='bridge'>
      <mac address='00:50:56:be:9b:0b'/>
      <source bridge='VM Network'/>
      <model type='e1000'/>
    </interface>
    <video>
      <model type='vmvga' vram='4096' primary='yes'/>
    </video>
  </devices>
</domain>

conversion succeed.

Is it enough for the verify?If so,i will change it to verified status.

Comment 11 Pino Toscano 2020-03-24 09:56:45 UTC
> Is it enough for the verify?

Yes, it looks OK.

As additional check: if you have real guests on your ESXi servers, then check that the XML of each domain is the same without and with this fix.

Comment 12 Marina Kalinin 2020-03-24 11:53:25 UTC
Thank you so much for quick turnaround!

Comment 14 mxie@redhat.com 2020-03-24 16:35:30 UTC
Reproduce the bug from v2v side with below builds:
libvirt-4.5.0-23.el7_7.6.x86_64
virt-v2v-1.40.2-5.el7_7.4.x86_64
qemu-kvm-rhev-2.12.0-33.el7_7.10.x86_64


Steps to reproduce:
1.Prepare a guest,set its CD-DVD type as Host device on VMware environment, file name for CD-DVD will be created automatically, check guest vmx file on ESXi host as below:
#cat Auto-esx6.7-rhel7.7-host_cd-without-filename/Auto-esx6.7-rhel7.7-host_cd-without-filename.vmx 
ide0:0.startConnected = "FALSE"
ide0:0.deviceType = "atapi-cdrom"
ide0:0.fileName = "/vmfs/devices/cdrom/mpx.vmhba33:C0:T0:L0"
ide0:0.present = "TRUE"

2.Modify guest vmx file on ESXi host to delete ide0:0.fileName 
ide0:0.startConnected = "FALSE"
ide0:0.deviceType = "atapi-cdrom"
ide0:0.present = "TRUE"

3.Convert the guest from VMware via vSphere client by virt-v2v
# virt-v2v  -ic vpx://root.73.141/data/10.73.75.219/?no_verify=1 Auto-esx6.7-rhel7.7-host_cd-without-filename -o rhv -os 10.66.144.40:/home/nfs_export -of raw --password-file /home/passed
[   0.0] Opening the source -i libvirt -ic vpx://root.73.141/data/10.73.75.219/?no_verify=1 Auto-esx6.7-rhel7.7-host_cd-without-filename
virt-v2v: error: internal error: invalid argument: cannot fetch XML 
description of guest ‘Auto-esx6.7-rhel7.7-host_cd-without-filename’: 
internal error: Missing essential config entry 'ide0:0.fileName'

If reporting bugs, run virt-v2v with debugging enabled and include the 
complete output:

  virt-v2v -v -x [...]

4.Convert the guest from ESXi host via vddk by virt-v2v
# virt-v2v  -ic esx://root.75.219/?no_verify=1 -it vddk -io vddk-libdir=/home/vmware-vix-disklib-distrib -io vddk-thumbprint=89:89:AE:6D:DE:B2:89:01:B0:CF:FC:D3:C8:A8:1A:5E:14:E4:B4:54 -o rhv-upload -os nfs_data -of raw -b ovirtmgmt -n ovirtmgmt -oc https://ibm-x3250m5-03.rhts.eng.pek2.redhat.com/ovirt-engine/api -op /home/rhvpasswd -oo rhv-cafile=/home/ca.pem -oo rhv-direct -oo rhv-verifypeer=true -ip /home/esxpw Auto-esx6.7-rhel7.7-host_cd-without-filename
Exception AttributeError: "'module' object has no attribute 'dump_plugin'" in <module 'threading' from '/usr/lib64/python2.7/threading.pyc'> ignored
[   0.9] Opening the source -i libvirt -ic esx://root.75.219/?no_verify=1 Auto-esx6.7-rhel7.7-host_cd-without-filename -it vddk  -io vddk-libdir=/home/vmware-vix-disklib-distrib -io vddk-thumbprint=89:89:AE:6D:DE:B2:89:01:B0:CF:FC:D3:C8:A8:1A:5E:14:E4:B4:54
virt-v2v: error: internal error: invalid argument: cannot fetch XML 
description of guest ‘Auto-esx6.7-rhel7.7-host_cd-without-filename’: 
internal error: Missing essential config entry 'ide0:0.fileName'

If reporting bugs, run virt-v2v with debugging enabled and include the 
complete output:

  virt-v2v -v -x [...]


5.Convert the guest from VMX file by virt-v2v
# virt-v2v -i vmx Auto-esx6.7-rhel7.7-host_cd-without-filename/Auto-esx6.7-rhel7.7-host_cd-without-filename.vmx -o null
[   0.0] Opening the source -i vmx Auto-esx6.7-rhel7.7-host_cd-without-filename/Auto-esx6.7-rhel7.7-host_cd-without-filename.vmx
[   0.0] Creating an overlay to protect the source from being modified
[   0.3] Opening the overlay
[  19.3] Inspecting the overlay
[  65.5] Checking for sufficient free disk space in the guest
[  65.5] Estimating space required on target for each disk
[  65.5] Converting Red Hat Enterprise Linux Server 7.7 Beta (Maipo) to run on KVM
virt-v2v: This guest has virtio drivers installed.
[ 196.6] Mapping filesystem data to avoid copying unused and blank areas
[ 198.7] Closing the overlay
[ 198.9] Assigning disks to buses
[ 198.9] Checking if the guest needs BIOS or UEFI to boot
[ 198.9] Initializing the target -o null
[ 199.0] Copying disk 1/1 to qemu URI json:{ "file.driver": "null-co", "file.size": "1E" } (raw)
    (100.00/100%)
[ 244.0] Creating output metadata
[ 244.0] Finishing off


6.Convert the guest from VMX via ssh by virt-v2v
#  virt-v2v -i vmx -it ssh ssh://root.75.219/vmfs/volumes/esx6.7-function/Auto-esx6.7-rhel7.7-host_cd-without-filename/Auto-esx6.7-rhel7.7-host_cd-without-filename.vmx -o rhv -os 10.66.144.40:/home/nfs_export -of qcow2
[   0.0] Opening the source -i vmx ssh://root.75.219/vmfs/volumes/esx6.7-function/Auto-esx6.7-rhel7.7-host_cd-without-filename/Auto-esx6.7-rhel7.7-host_cd-without-filename.vmx
Warning: Permanently added '10.73.75.219' (RSA) to the list of known hosts.
[   0.6] Creating an overlay to protect the source from being modified
[   1.2] Opening the overlay
[   8.3] Inspecting the overlay
[  60.0] Checking for sufficient free disk space in the guest
[  60.0] Estimating space required on target for each disk
[  60.0] Converting Red Hat Enterprise Linux Server 7.7 Beta (Maipo) to run on KVM
virt-v2v: This guest has virtio drivers installed.
[ 229.6] Mapping filesystem data to avoid copying unused and blank areas
[ 231.2] Closing the overlay
[ 231.4] Assigning disks to buses
[ 231.4] Checking if the guest needs BIOS or UEFI to boot
[ 231.4] Initializing the target -o rhv -os 10.66.144.40:/home/nfs_export
[ 232.0] Copying disk 1/1 to /tmp/v2v.g1DgSV/5792ab14-7746-4340-a27d-845dc12b8db9/images/771ad1ac-d48b-4e4d-9d1d-572b62d696a5/83981778-b0de-491a-add5-3ec5e1264618 (qcow2)
    (100.00/100%)
[ 435.3] Creating output metadata
[ 435.4] Finishing off


7.Convert the guest from ova by virt-v2v
# virt-v2v -i ova Auto-esx6_7-rhel7.7-host_cd-without-filename -o null
[   0.0] Opening the source -i ova Auto-esx6_7-rhel7.7-host_cd-without-filename
[   9.9] Creating an overlay to protect the source from being modified
[  10.2] Opening the overlay
[  29.1] Inspecting the overlay
[  77.0] Checking for sufficient free disk space in the guest
[  77.0] Estimating space required on target for each disk
[  77.0] Converting Red Hat Enterprise Linux Server 7.7 Beta (Maipo) to run on KVM
virt-v2v: This guest has virtio drivers installed.
[ 209.0] Mapping filesystem data to avoid copying unused and blank areas
[ 211.2] Closing the overlay
[ 211.4] Assigning disks to buses
[ 211.4] Checking if the guest needs BIOS or UEFI to boot
[ 211.4] Initializing the target -o null
[ 211.5] Copying disk 1/1 to qemu URI json:{ "file.driver": "null-co", "file.size": "1E" } (raw)
    (100.00/100%)
[ 275.8] Creating output metadata
[ 275.8] Finishing off

Reproduced result:
  Can reproduce the bug when convert guest from VMware via https protocol(vpx or esx) by virt-v2v



Verify the bug with below builds:
libvirt-4.5.0-23.el7_7.7.x86_64
virt-v2v-1.40.2-5.el7_7.4.x86_64
qemu-kvm-rhev-2.12.0-33.el7_7.10.x86_64

Steps:
1.Convert the guest from VMware via vSphere client by virt-v2v
# virt-v2v  -ic vpx://root.73.141/data/10.73.75.219/?no_verify=1 Auto-esx6.7-rhel7.7-host_cd-without-filename -o rhv -os 10.66.144.40:/home/nfs_export -of raw --password-file /home/passed
[   0.0] Opening the source -i libvirt -ic vpx://root.73.141/data/10.73.75.219/?no_verify=1 Auto-esx6.7-rhel7.7-host_cd-without-filename
[   2.4] Creating an overlay to protect the source from being modified
[   3.4] Opening the overlay
[  25.3] Inspecting the overlay
[ 217.4] Checking for sufficient free disk space in the guest
[ 217.4] Estimating space required on target for each disk
[ 217.4] Converting Red Hat Enterprise Linux Server 7.7 Beta (Maipo) to run on KVM


virt-v2v: This guest has virtio drivers installed.
[1780.1] Mapping filesystem data to avoid copying unused and blank areas
[1784.2] Closing the overlay
[1784.5] Assigning disks to buses
[1784.5] Checking if the guest needs BIOS or UEFI to boot
[1784.5] Initializing the target -o rhv -os 10.66.144.40:/home/nfs_export
[1784.8] Copying disk 1/1 to /tmp/v2v.LrOU1v/5792ab14-7746-4340-a27d-845dc12b8db9/images/75b8690f-f559-4989-adc3-3a91634c15a3/a62ad953-a281-4ce0-b9ab-d0a32e840089 (raw)
    (100.00/100%)
[2164.8] Creating output metadata
[2165.0] Finishing off

2.Convert the guest from ESXi host via vddk by virt-v2v and checkpoints of guest are passed after finishing conversion
# virt-v2v  -ic esx://root.75.219/?no_verify=1 -it vddk -io vddk-libdir=/home/vmware-vix-disklib-distrib -io vddk-thumbprint=89:89:AE:6D:DE:B2:89:01:B0:CF:FC:D3:C8:A8:1A:5E:14:E4:B4:54 -o rhv-upload -os nfs_data -of raw -b ovirtmgmt -n ovirtmgmt -oc https://ibm-x3250m5-03.rhts.eng.pek2.redhat.com/ovirt-engine/api -op /home/rhvpasswd -oo rhv-cafile=/home/ca.pem -oo rhv-direct -oo rhv-verifypeer=true -ip /home/esxpw Auto-esx6.7-rhel7.7-host_cd-without-filename
Exception AttributeError: "'module' object has no attribute 'dump_plugin'" in <module 'threading' from '/usr/lib64/python2.7/threading.pyc'> ignored
[   0.9] Opening the source -i libvirt -ic esx://root.75.219/?no_verify=1 Auto-esx6.7-rhel7.7-host_cd-without-filename -it vddk  -io vddk-libdir=/home/vmware-vix-disklib-distrib -io vddk-thumbprint=89:89:AE:6D:DE:B2:89:01:B0:CF:FC:D3:C8:A8:1A:5E:14:E4:B4:54
[   2.4] Creating an overlay to protect the source from being modified
[   6.4] Opening the overlay
[  15.0] Inspecting the overlay
[  67.1] Checking for sufficient free disk space in the guest
[  67.1] Estimating space required on target for each disk
[  67.1] Converting Red Hat Enterprise Linux Server 7.7 Beta (Maipo) to run on KVM
virt-v2v: This guest has virtio drivers installed.
[ 216.6] Mapping filesystem data to avoid copying unused and blank areas
[ 219.2] Closing the overlay
[ 219.5] Assigning disks to buses
[ 219.5] Checking if the guest needs BIOS or UEFI to boot
[ 219.5] Initializing the target -o rhv-upload -oc https://ibm-x3250m5-03.rhts.eng.pek2.redhat.com/ovirt-engine/api -op /home/rhvpasswd -os nfs_data
[ 221.2] Copying disk 1/1 to qemu URI json:{ "file.driver": "nbd", "file.path": "/var/tmp/rhvupload.tu0XZJ/nbdkit0.sock", "file.export": "/" } (raw)
    (100.00/100%)
[ 811.5] Creating output metadata
[ 818.6] Finishing off

3.Convert the guest from VMX file by virt-v2v
# virt-v2v -i vmx Auto-esx6.7-rhel7.7-host_cd-without-filename/Auto-esx6.7-rhel7.7-host_cd-without-filename.vmx -o null
[   0.0] Opening the source -i vmx Auto-esx6.7-rhel7.7-host_cd-without-filename/Auto-esx6.7-rhel7.7-host_cd-without-filename.vmx
[   0.0] Creating an overlay to protect the source from being modified
[   0.3] Opening the overlay
[   6.5] Inspecting the overlay
[  56.3] Checking for sufficient free disk space in the guest
[  56.3] Estimating space required on target for each disk
[  56.3] Converting Red Hat Enterprise Linux Server 7.7 Beta (Maipo) to run on KVM
virt-v2v: This guest has virtio drivers installed.
[ 187.8] Mapping filesystem data to avoid copying unused and blank areas
[ 189.9] Closing the overlay
[ 190.1] Assigning disks to buses
[ 190.1] Checking if the guest needs BIOS or UEFI to boot
[ 190.1] Initializing the target -o null
[ 190.2] Copying disk 1/1 to qemu URI json:{ "file.driver": "null-co", "file.size": "1E" } (raw)
    (100.00/100%)
[ 235.3] Creating output metadata
[ 235.3] Finishing off


4.Convert the guest from VMX via ssh by virt-v2v
#virt-v2v -i vmx -it ssh ssh://root.75.219/vmfs/volumes/esx6.7-function/Auto-esx6.7-rhel7.7-host_cd-without-filename/Auto-esx6.7-rhel7.7-host_cd-without-filename.vmx -o null
[   0.0] Opening the source -i vmx ssh://root.75.219/vmfs/volumes/esx6.7-function/Auto-esx6.7-rhel7.7-host_cd-without-filename/Auto-esx6.7-rhel7.7-host_cd-without-filename.vmx
Warning: Permanently added '10.73.75.219' (RSA) to the list of known hosts.
[   0.4] Creating an overlay to protect the source from being modified
[   0.9] Opening the overlay
[   8.0] Inspecting the overlay
[  63.2] Checking for sufficient free disk space in the guest
[  63.2] Estimating space required on target for each disk
[  63.2] Converting Red Hat Enterprise Linux Server 7.7 Beta (Maipo) to run on KVM
virt-v2v: This guest has virtio drivers installed.
[ 246.6] Mapping filesystem data to avoid copying unused and blank areas
[ 248.4] Closing the overlay
[ 248.6] Assigning disks to buses
[ 248.6] Checking if the guest needs BIOS or UEFI to boot
[ 248.6] Initializing the target -o null
[ 248.7] Copying disk 1/1 to qemu URI json:{ "file.driver": "null-co", "file.size": "1E" } (raw)
    (100.00/100%)
[ 465.7] Creating output metadata
[ 465.7] Finishing off


5.Convert the guest from ova by virt-v2v
# virt-v2v -i ova Auto-esx6_7-rhel7.7-host_cd-without-filename -o null
[   0.0] Opening the source -i ova Auto-esx6_7-rhel7.7-host_cd-without-filename
[  10.4] Creating an overlay to protect the source from being modified
[  10.7] Opening the overlay
[  15.9] Inspecting the overlay
[  66.1] Checking for sufficient free disk space in the guest
[  66.1] Estimating space required on target for each disk
[  66.1] Converting Red Hat Enterprise Linux Server 7.7 Beta (Maipo) to run on KVM
virt-v2v: This guest has virtio drivers installed.
[ 197.7] Mapping filesystem data to avoid copying unused and blank areas
[ 199.7] Closing the overlay
[ 199.9] Assigning disks to buses
[ 199.9] Checking if the guest needs BIOS or UEFI to boot
[ 199.9] Initializing the target -o null
[ 200.0] Copying disk 1/1 to qemu URI json:{ "file.driver": "null-co", "file.size": "1E" } (raw)
    (100.00/100%)
[ 264.3] Creating output metadata
[ 264.3] Finishing off

Result:
    Can convert guest from VMware via https protocol(vpx or esx) by virt-v2v when there is no ide0:0.fileName for "atapi-cdrom" in guest vmx file, so bug has been fixed.

Comment 18 errata-xmlrpc 2020-04-30 17:17:13 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:1993


Note You need to log in before you can comment on or make changes to this bug.