- Issued:
- 2009-05-18
- Updated:
- 2009-05-18
RHBA-2009:1048 - Bug Fix Advisory
Synopsis
rgmanager bug-fix and enhancement update
Type/Severity
Bug Fix Advisory
Topic
Updated rgmanager packages that fix several bugs and add enhancements
are now available.
Description
The rgmanager packages contain the Red Hat Resource Group Manager, which
provides high availability for critical server applications.
This update applies the following bug fixes:
- A file descriptor leak during cluster events has been fixed.
- HA LVM now properly displays the entire error message.
- The max_restarts parameter is no longer ignored if the expire_time is 0.
- clurgmgrd no longer improperly prints out the number representing the log
severity.
- Resource names with spaces are now properly handled.
- PostgreSQL 8.1.11 now works properly with the postgres-8.sh and
postgres-8.metadata resource agents.
- Zero length PID files no longer cause resource start failures.
- Recovery policies of type restart now work with services using resources
based on ra-skelet.sh.
- rgmanager now resolves hostnames to IP addresses and back when checking
NFS clients.
- Timeouts are now enforced on a per-resource basis.
- Sleep time in ip.sh after removing an IP address is now user configurable
(default 10 seconds).
- clusvcadm -d no longer outputs 'YES' if a script resource fails on stop.
- Restricted failover domain crashes are now properly detected.
- Status checks have been optimized.
- IP resources can now be started if link monitoring is disabled.
As well, this update adds the following enhancements:
- A quick_status option has been added to reduce or eliminate load spikes
on machines with lots of file systems.
- clustat and clusvcadm performance has been increased.
Users of rgmanager are advised to upgrade to these updated packages, which
resolve these issues and add these enhancements.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux High Availability for x86_64 4 x86_64
- Red Hat Enterprise Linux High Availability for x86_64 4 ppc
- Red Hat Enterprise Linux High Availability for x86_64 4 ia64
- Red Hat Enterprise Linux High Availability for x86_64 4 i386
Fixes
- BZ - 246668 - exportfs returns hostnames instead of IPs causing problems with nfsclient.sh
- BZ - 333161 - Feature Request: timeout on start/stop actions
- BZ - 428108 - service left untouched if restricted failover domain goes away
- BZ - 450150 - resource names with spaces are mishandled.
- BZ - 461954 - File descriptor leak in event processing
- BZ - 461956 - Terrible clustat / clusvcadm performance.
- BZ - 462452 - RHEL4 HA LVM setup check error messages not being fully displayed
- BZ - 466249 - [patch] postgres-8.sh and metadata fixes for rhel5
- BZ - 475289 - max_restarts parameter is ignored
- BZ - 480828 - Zero-length pid files cause resource start failures
- BZ - 480831 - Recovery policy of type restart doesn't work with a service using a resource based on ra-skelet.sh
- BZ - 480835 - clusvcadm -d outputs 'YES' if script resource fails on stop.
- BZ - 484955 - syslog messages being corrupted
- BZ - 489369 - VIP parameters 'monitor_link' not apply
CVEs
(none)
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.