- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHBA-2009:0101 - Bug Fix Advisory
Synopsis
rgmanager bug-fix and enhancements update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated rgmanager package that fixes several bugs and adds enhancements
is now available.
Description
The rgmanager package contains the Red Hat Resource Group Manager, which
provides high availability for critical server applications in the event of
planned or unplanned system downtime.
This updated package applies the following bug fixes:
- HA LVM now prevents users from running with an invalid configuration.
- HA LVM now looks in the correct location for initrd on the ia64 architecture.
- The ip.sh script now recognizes other interfaces besides eth* to using
with bonding.
- rgmanager no longer leaks file descriptors potentially causing issues
with SELinux.
- ip.sh now properly sets the netmask if none is provided.
- rgmanager now detects restricted failover domain crashes.
- Mountpoints from cluster.conf which have symbolic links no longer cause
errors or warnings.
- ip.sh will now work with xen bridges on bonded interfaces
- On a cluster node when a rgmanager resource IP is a substring of the
broadcast IP, stopping or relocating the service will bring down the
interface. This has been fixed.
- IPv6 connectivity is no longer removed when removing an IPv6 address.
- rgmanager now waits for a fence domain join before starting.
- manpage for clusvcadm is no longer missing the description for the '-M'
option.
- The tomcat resource agent now properly handles names with spaces.
- nfsclient.sh can now handle hostnames instead of just IP addresses in hosts.
- The postgres-8.sh resource agent now works properly.
- The fuser.sh script has been modified to properly accept output from the
fuser command.
Also, This updated package adds the following enhancements:
- Sybase failover agent has been added.
- The ip.sh sleep delay can now be changed through a tunable parameter.
- The HA LVM server will now relocate it it loses connection to the SAN.
- Timeouts have been added on stop and start actions.
- It is now possible to restart rgmanager without forcing a migration of
all services.
- Status checks can now be frozen on a per service basis.
- Xen migration can now take place over networks that are not used for
clustering.
Users of rgmanager are advised to upgrade to this updated package, which
resolves these issues and adds these enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux High Availability for x86_64 5 x86_64
- Red Hat Enterprise Linux High Availability for x86_64 5 ppc
- Red Hat Enterprise Linux High Availability for x86_64 5 ia64
- Red Hat Enterprise Linux High Availability for x86_64 5 i386
- Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 5 x86_64
- Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 5 i386
Fixes
- BZ - 331661 - Bond slaves other than eth* are ignored by rgmanager
- BZ - 431713 - HA LVM should prevent users from running an invalid setup (2)
- BZ - 433313 - rgmanager leaks file descriptors for /var/run/cluster/rgmanager.sk
- BZ - 434887 - [RHCS] ip.sh do not set the correct netmask
- BZ - 435466 - Rgmanager shows wrong service status in restricted failover domain
- BZ - 435795 - Rich Sybase failover support
- BZ - 440144 - RFE: If HA lvm server lost connection to SAN, relocate to next machine
- BZ - 441582 - symlinks in cluster-managed mount points cause erroneous failures
- BZ - 443660 - Insufficient parameter descriptions in LVM script
- BZ - 445662 - tomcat-5.sh - names with spaces are mishandled.
- BZ - 446260 - HA-LVM: Will not start on ia64, looking for initrd in wrong directory.
- BZ - 451654 - Cluster Service Cannot Start With Xen Bridge Enabled On Bonded Interface
- BZ - 453000 - Rgmanager stops heartbeat interface is Virtual IP is substring match to the broadcast address
- BZ - 455324 - exportfs returns hostnames instead of IPs causing problems with nfsclient.sh
- BZ - 455326 - Feature Request: timeout on start/stop actions
- BZ - 455327 - RFE: Make ip.sh sleep delay tunable
- BZ - 459582 - ipv6 connectivity is killed when removing an IPv6 address
- BZ - 459754 - rgmanager needs to wait for fence domain join to complete on startup
- BZ - 460032 - man page for clusvcadm missing '-M' option
- BZ - 462679 - rgmanager fails to connect to other members when using recovery=restart policy
- BZ - 462910 - [patch] postgres-8.sh and metadata fixes for rhel5
- BZ - 467686 - [PATCH] Fix rhel5 fs.sh fuser parsing
CVEs
(none)
References
(none)
Red Hat Enterprise Linux High Availability for x86_64 5
SRPM | |
---|---|
rgmanager-2.0.46-1.el5.src.rpm | SHA-256: aa999b438ef46726346d9c7f9a44f7767e1afe10250bf2c2e076d920839058bc |
x86_64 | |
rgmanager-2.0.46-1.el5.x86_64.rpm | SHA-256: 04ebb09ecaed00693204f158cb22f6773e4613c3fe5122203fd2f9c378e6eec0 |
ppc | |
rgmanager-2.0.46-1.el5.ppc.rpm | SHA-256: 09cc2df753646be6a202a832d887f44d1f6c196ea27fcd8c31c23a752186bde5 |
ia64 | |
rgmanager-2.0.46-1.el5.ia64.rpm | SHA-256: dc8dc30cd5376ba548fed6b7a6cccedefeb4109f4d5838bdeee9c158e128e493 |
i386 | |
rgmanager-2.0.46-1.el5.i386.rpm | SHA-256: 1592426327323f48bf11c0efdc1f00fcbc2c1074bd4b95b7108d72d98763062c |
Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 5
SRPM | |
---|---|
rgmanager-2.0.46-1.el5.src.rpm | SHA-256: aa999b438ef46726346d9c7f9a44f7767e1afe10250bf2c2e076d920839058bc |
x86_64 | |
rgmanager-2.0.46-1.el5.x86_64.rpm | SHA-256: 04ebb09ecaed00693204f158cb22f6773e4613c3fe5122203fd2f9c378e6eec0 |
i386 | |
rgmanager-2.0.46-1.el5.i386.rpm | SHA-256: 1592426327323f48bf11c0efdc1f00fcbc2c1074bd4b95b7108d72d98763062c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.