- Issued:
- 2014-01-30
- Updated:
- 2014-01-30
RHEA-2014:0111 - Product Enhancement Advisory
Synopsis
new package: sos-plugins-openstack
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
A new sos-plugins-openstack package is now available for Red Hat
Enterprise Linux OpenStack Platform 3.0 (Grizzly).
Description
OpenStack plugins are now available for the sosreport tool. This is a
unified tool for collecting information about system hardware and
configuration. This information can then be used for diagnostic purposes
and debugging. It is commonly used to help support technicians and
developers.
This update also adds the following enhancement:
- a new tool called rhos-logs-collector has been introduced, and can be
used for collecting logs and system state.
This package contains backports of sos OpenStack plugins for Red Hat
Enterprise Linux 6.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat OpenStack grizzly x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat OpenStack grizzly
SRPM | |
---|---|
pssh-2.3.1-5.el6ost.src.rpm | SHA-256: 94fa01723cc2bb5a230b62939c94cd322a973967a80774cc9767a9e3a8602c71 |
sos-plugins-openstack-2013.1-2.el6ost.src.rpm | SHA-256: b0660558c09c479316450e6ee04218cb597be9adfaf8293281dbbfbe2cc92a9a |
x86_64 | |
pssh-2.3.1-5.el6ost.noarch.rpm | SHA-256: 7a3a14501ffa42a0707c5650c090d99709ca9649ff10f87a8ce895ccd992e925 |
rhos-log-collector-2013.1-2.el6ost.noarch.rpm | SHA-256: 8d3f32caa804dce54e1e7c7c11994e9a53e5c60ac95fddce8cffaaa061489f06 |
sos-plugins-openstack-2013.1-2.el6ost.noarch.rpm | SHA-256: b8e7385bbd95dc622070bbe62b606bc0552318fbb901783c35f970e3ab6cee0b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.