Skip to navigation

Bug Fix Advisory clumanager bug fix update

Advisory: RHBA-2005:676-3
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2005-09-30
Last updated on: 2005-09-30
Affected Products: Cluster Suite EL3

Details

Updated Red Hat Cluster Manager packages that fix various bugs and provide
enhancements are now available for Red Hat Cluster Suite on Red Hat
Enterprise Linux 3.

Red Hat Cluster Manager provides high availability of critical server
applications in the event of planned or unplanned system downtime.

Various bugs in Red Hat Cluster Manager have been discovered and addressed
since the release of Red Hat Enterprise Linux 3, including:

- Incomplete man page for clusvcadm
- Newer firmware on APC AP9225 with 9217 management card caused STONITH
to fail.
- Passwords on older WTI (NPS115/230) devices of length 1 were not
recognized.

In addition, the following features have been implemented:

- Increased timeouts for Bull PAP STONITH driver (supports larger,
32-CPU variants)
- Optional use of netlink-based utilities to work around kernel->userland
ifconfig issues.
- Option to disable ARP checking (solves some routing problems when using
bonded interfaces).

Users of Red Hat Cluster Manager are advised to upgrade to these updated
packages, which resolve these issues.

Performing a Cluster Upgrade

This erratum can be upgraded in a "rolling" fashion. That is, it is
possible to upgrade the cluster software without taking the entire cluster
offline at once. Due to a bugfix between 1.2.3 and 1.2.9, however, it is
necessary to upgrade the lowest-ordered member last. (If you are upgrading
from 1.2.9 or later, you may upgrade the members in any order; the
instructions below assume you are running clumanager version 1.2.3.)

Notes (Before you begin):

* All cluster members must be running and participating in the cluster
quorum, or no members should be running at all.

* Is a good idea to perform this upgrade during scheduled maintenance
and/or when it will impact the fewest number of users.

* Switching to/from the netlink-based IP management utilities (available
in versions 1.2.27 and later) has a significant impact on the way
services are handled, and must be done with all cluster services
disabled, but with all cluster nodes participating in the cluster
quorum. See the cludb man page for more information.

* Disabling ARP checking is only recommended for users who see "Not in
subnet" errors. This feature requires each node to be restarted, and
may require manual copying of /etc/cluster.xml to each member.
See the cludb man page for more information.

Steps (with all cluster members running):

(1) Run the following:

# cludb -g members%member0%name

The host displayed is the lowest-ordered cluster member. This member must
be upgraded *last*.

If this member is "not found", look at /etc/cluster.xml. Look for the
"member" tag with the lowest "id" property; this is the lowest-ordered member.

Make a note of this member; this member must be upgraded last.

(2) Run 'rpm -Fvh [filenames]' (as noted above) on all cluster members
except the member noted in step (1), one at a time. Do not execute this
command on multiple members simultaneously, as the upgrade process disables
a member temporarily (removing it from the cluster quorum). If too many
members are disabled simultaneously, the cluster quorum will no longer
exist, forcing services managed by the cluster software to become
unavailable.

Services located on a member that is being upgraded will migrate to other
cluster members whenever possible.

(3) Run 'rpm -Uvh [filenames]' on the member noted in step (1).

(4) If desired, balance cluster services across available members using
redhat-config-cluster or clusvcadm.

(5) Run 'chkconfig --add clumanager' on all members.


Steps (No cluster members running the cluster software):

(1) Run 'service clumanager stop' on all members.

(2) Run 'rpm -Uvh [filenames]' on all members.

(3) Run 'chkconfig --add clumanager' on all members.

(4) Restart the cluster software on all members if desired.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate. The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

Updated packages

Cluster Suite EL3

SRPMS:
clumanager-1.2.28-1.src.rpm
File outdated by:  RHBA-2009:1436
    MD5: a4e93cc2a00a8b709e45c5220544f9ff
 
IA-32:
clumanager-1.2.28-1.i386.rpm
File outdated by:  RHBA-2009:1436
    MD5: ce5d9c267e9137dfbe5a7323d5193ba8
 
IA-64:
clumanager-1.2.28-1.ia64.rpm
File outdated by:  RHBA-2009:1436
    MD5: d2d45f60887de7afac581c2348f01639
 
x86_64:
clumanager-1.2.28-1.x86_64.rpm
File outdated by:  RHBA-2009:1436
    MD5: 7fe1449f458d3846d00863a7fd95f540
 

Bugs fixed (see bugzilla for more information)

155393 - RFE: option to disable ARP checking on connections
162966 - Fencing is not working with APC AP 9225 Masterswitch
163636 - RFE: Provide iproute-based workaround of e1000 problem for service IPs


Keywords

bugs, clumanager, fix, package


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/