Skip to navigation

Enhancement Advisory pcs bug fix update

Advisory: RHEA-2013:0655-1
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2013-03-18
Last updated on: 2013-03-18
Affected Products: Red Hat Enterprise Linux High Availability (v. 6)
Red Hat Enterprise Linux High Availability EUS (v. 6.4.z)
Red Hat Enterprise Linux Resilient Storage (v. 6)
Red Hat Enterprise Linux Resilient Storage EUS (v. 6.4.z)

Details

Updated pcs packages that fix one bug are now available for Red Hat Enterprise
Linux 6.

The pcs packages provide a command-line tool to configure and manage Pacemaker
and Corosync tools.

This update fixes the following bug:

* The "pcs config" command did not show resources configured as master and slave
resources when the configuration of the Pacemaker cluster was reviewed.
Consequently, users had to directly analyze the CIB to view the configured
master and slave resources and their options. This update provides a patch to
address this bug, so the "pcs config" command now shows all resources, including
master and slave resources. (BZ#915585)

Users of pcs are advised to upgrade to these updated packages, which fix this
bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux High Availability (v. 6)

SRPMS:
pcs-0.9.26-10.el6_4.1.src.rpm
File outdated by:  RHBA-2013:1849
    MD5: 997fb504fe377433bd214ccbf3c282e0
SHA-256: 81b2c69be2675bee7e98f9a4e39133cb452403ab504f25c9fc350d38201ea09a
 
IA-32:
pcs-0.9.26-10.el6_4.1.noarch.rpm
File outdated by:  RHBA-2013:1848
    MD5: 5be86635d45829fb8c96c8a8df53bdc8
SHA-256: db0c4de1a81faf53b876a56ddba883b641899b1d5a907dba95aaf1f575014a09
 
x86_64:
pcs-0.9.26-10.el6_4.1.noarch.rpm
File outdated by:  RHBA-2013:1848
    MD5: 5be86635d45829fb8c96c8a8df53bdc8
SHA-256: db0c4de1a81faf53b876a56ddba883b641899b1d5a907dba95aaf1f575014a09
 
Red Hat Enterprise Linux High Availability EUS (v. 6.4.z)

SRPMS:
pcs-0.9.26-10.el6_4.1.src.rpm
File outdated by:  RHBA-2013:1849
    MD5: 997fb504fe377433bd214ccbf3c282e0
SHA-256: 81b2c69be2675bee7e98f9a4e39133cb452403ab504f25c9fc350d38201ea09a
 
IA-32:
pcs-0.9.26-10.el6_4.1.noarch.rpm
File outdated by:  RHBA-2013:1492
    MD5: 5be86635d45829fb8c96c8a8df53bdc8
SHA-256: db0c4de1a81faf53b876a56ddba883b641899b1d5a907dba95aaf1f575014a09
 
x86_64:
pcs-0.9.26-10.el6_4.1.noarch.rpm
File outdated by:  RHBA-2013:1849
    MD5: 5be86635d45829fb8c96c8a8df53bdc8
SHA-256: db0c4de1a81faf53b876a56ddba883b641899b1d5a907dba95aaf1f575014a09
 
Red Hat Enterprise Linux Resilient Storage (v. 6)

SRPMS:
pcs-0.9.26-10.el6_4.1.src.rpm
File outdated by:  RHBA-2013:1849
    MD5: 997fb504fe377433bd214ccbf3c282e0
SHA-256: 81b2c69be2675bee7e98f9a4e39133cb452403ab504f25c9fc350d38201ea09a
 
IA-32:
pcs-0.9.26-10.el6_4.1.noarch.rpm
File outdated by:  RHBA-2013:1848
    MD5: 5be86635d45829fb8c96c8a8df53bdc8
SHA-256: db0c4de1a81faf53b876a56ddba883b641899b1d5a907dba95aaf1f575014a09
 
x86_64:
pcs-0.9.26-10.el6_4.1.noarch.rpm
File outdated by:  RHBA-2013:1848
    MD5: 5be86635d45829fb8c96c8a8df53bdc8
SHA-256: db0c4de1a81faf53b876a56ddba883b641899b1d5a907dba95aaf1f575014a09
 
Red Hat Enterprise Linux Resilient Storage EUS (v. 6.4.z)

SRPMS:
pcs-0.9.26-10.el6_4.1.src.rpm
File outdated by:  RHBA-2013:1849
    MD5: 997fb504fe377433bd214ccbf3c282e0
SHA-256: 81b2c69be2675bee7e98f9a4e39133cb452403ab504f25c9fc350d38201ea09a
 
IA-32:
pcs-0.9.26-10.el6_4.1.noarch.rpm
File outdated by:  RHBA-2013:1849
    MD5: 5be86635d45829fb8c96c8a8df53bdc8
SHA-256: db0c4de1a81faf53b876a56ddba883b641899b1d5a907dba95aaf1f575014a09
 
x86_64:
pcs-0.9.26-10.el6_4.1.noarch.rpm
File outdated by:  RHBA-2013:1849
    MD5: 5be86635d45829fb8c96c8a8df53bdc8
SHA-256: db0c4de1a81faf53b876a56ddba883b641899b1d5a907dba95aaf1f575014a09
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/