Updated cluster packages that fix one bug are now available for Red HatEnterprise Linux 6.

The Red Hat Cluster Manager is a collection of technologies working together toprovide data integrity and the ability to maintain application availability inthe event of a failure. Using redundant hardware, shared disk storage, powermanagement, and robust cluster communication and application failovermechanisms, a cluster can meet the needs of the enterprise market.This update fixes the following bug:* When using pacemaker, if a user completes fencing manually or overrides theneed for fencing they use the “pcs stonith confirm” command to notify the fenceddaemon. Previously, if automatic fencing was failing or taking too long and theuser completed fencing manually, fenced could miss this notification while busyattempting to complete the fencing automatically. This prevented or slowedcluster recovery from the loss of a node. This update fixes this bug byextending the time that the fencing FIFO is available to fenced and making theAPI call write into that FIFO. As a result, fenced now receives the notificationand cluster recovery proceeds as expected in the described situation.(BZ#1079991)Users of cluster are advised to upgrade to these updated packages, which fixthis bug.
Before applying this update, make sure all previously-released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux High Availability (v. 6)

SRPMS:
cluster-3.0.12.1-59.el6_5.2.src.rpm
    MD5: f3e9cee0b01fc36c91e0f0cf7e3dfb5eSHA-256: d3d87612329c288aea74a278fade283816a54aa2c970cace7db185e3581f9ba4
 
IA-32:
cluster-debuginfo-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: d3426b76e7313e0c6667ccd21c95d3ceSHA-256: c73b2119119c90cb81c4331a86bc525eeb871c2e649f1e297db679e5db6b0a82
clusterlib-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: b0ee113a63851fdc24ef31606348d606SHA-256: 86d1f6249f2897092c696e8ffd1da4851b83b0c3e17155187464d48459886f6f
clusterlib-devel-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: 4d2f6f6a5f35d71ce023379d85c49282SHA-256: fa60a098a5abe0ca92a42849b655bb96d1577b635c510e358d4796671596cdb0
cman-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: df38f4db250a8ce833c69e8c2b0c903fSHA-256: 8173032d42808f6386c983471570f3a4630564a72bad8c7b4d84e092e06b5132
 
x86_64:
cluster-debuginfo-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: d3426b76e7313e0c6667ccd21c95d3ceSHA-256: c73b2119119c90cb81c4331a86bc525eeb871c2e649f1e297db679e5db6b0a82
cluster-debuginfo-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: a61e9c1c4a063246109f979233f47fbdSHA-256: 4dec5c41857cc5930e2cbe4a24c4f48db1935f4eb9f20b467249694c9334a439
clusterlib-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: b0ee113a63851fdc24ef31606348d606SHA-256: 86d1f6249f2897092c696e8ffd1da4851b83b0c3e17155187464d48459886f6f
clusterlib-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: e65cd0456f1ba01439cc5dff449ed69dSHA-256: 204d41d577c39f4d0b0befa1d8f85ca8f96600408cee330b8682d350f6a39b29
clusterlib-devel-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: 4d2f6f6a5f35d71ce023379d85c49282SHA-256: fa60a098a5abe0ca92a42849b655bb96d1577b635c510e358d4796671596cdb0
clusterlib-devel-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: 5d11070b6e385a580ea6d95946ef2231SHA-256: b22fab76a7af5f3bb9de6569cc4ea6a1fad95a2ac70e5c3b9857e1ae6f4be32a
cman-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: e0cea92e8f2bee81e57cc9f21c88a30cSHA-256: caa62d778e4d3e19cb7f8fd8ae1890d541ce6f63c617acb4cc1990ead8f22ee2
 
Red Hat Enterprise Linux High Availability EUS (v. 6.5.z)

SRPMS:
cluster-3.0.12.1-59.el6_5.2.src.rpm
    MD5: f3e9cee0b01fc36c91e0f0cf7e3dfb5eSHA-256: d3d87612329c288aea74a278fade283816a54aa2c970cace7db185e3581f9ba4
 
IA-32:
cluster-debuginfo-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: d3426b76e7313e0c6667ccd21c95d3ceSHA-256: c73b2119119c90cb81c4331a86bc525eeb871c2e649f1e297db679e5db6b0a82
clusterlib-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: b0ee113a63851fdc24ef31606348d606SHA-256: 86d1f6249f2897092c696e8ffd1da4851b83b0c3e17155187464d48459886f6f
clusterlib-devel-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: 4d2f6f6a5f35d71ce023379d85c49282SHA-256: fa60a098a5abe0ca92a42849b655bb96d1577b635c510e358d4796671596cdb0
cman-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: df38f4db250a8ce833c69e8c2b0c903fSHA-256: 8173032d42808f6386c983471570f3a4630564a72bad8c7b4d84e092e06b5132
 
x86_64:
cluster-debuginfo-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: d3426b76e7313e0c6667ccd21c95d3ceSHA-256: c73b2119119c90cb81c4331a86bc525eeb871c2e649f1e297db679e5db6b0a82
cluster-debuginfo-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: a61e9c1c4a063246109f979233f47fbdSHA-256: 4dec5c41857cc5930e2cbe4a24c4f48db1935f4eb9f20b467249694c9334a439
clusterlib-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: b0ee113a63851fdc24ef31606348d606SHA-256: 86d1f6249f2897092c696e8ffd1da4851b83b0c3e17155187464d48459886f6f
clusterlib-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: e65cd0456f1ba01439cc5dff449ed69dSHA-256: 204d41d577c39f4d0b0befa1d8f85ca8f96600408cee330b8682d350f6a39b29
clusterlib-devel-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: 4d2f6f6a5f35d71ce023379d85c49282SHA-256: fa60a098a5abe0ca92a42849b655bb96d1577b635c510e358d4796671596cdb0
clusterlib-devel-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: 5d11070b6e385a580ea6d95946ef2231SHA-256: b22fab76a7af5f3bb9de6569cc4ea6a1fad95a2ac70e5c3b9857e1ae6f4be32a
cman-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: e0cea92e8f2bee81e57cc9f21c88a30cSHA-256: caa62d778e4d3e19cb7f8fd8ae1890d541ce6f63c617acb4cc1990ead8f22ee2
 
Red Hat Enterprise Linux Resilient Storage (v. 6)

SRPMS:
cluster-3.0.12.1-59.el6_5.2.src.rpm
    MD5: f3e9cee0b01fc36c91e0f0cf7e3dfb5eSHA-256: d3d87612329c288aea74a278fade283816a54aa2c970cace7db185e3581f9ba4
 
IA-32:
cluster-debuginfo-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: d3426b76e7313e0c6667ccd21c95d3ceSHA-256: c73b2119119c90cb81c4331a86bc525eeb871c2e649f1e297db679e5db6b0a82
clusterlib-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: b0ee113a63851fdc24ef31606348d606SHA-256: 86d1f6249f2897092c696e8ffd1da4851b83b0c3e17155187464d48459886f6f
clusterlib-devel-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: 4d2f6f6a5f35d71ce023379d85c49282SHA-256: fa60a098a5abe0ca92a42849b655bb96d1577b635c510e358d4796671596cdb0
cman-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: df38f4db250a8ce833c69e8c2b0c903fSHA-256: 8173032d42808f6386c983471570f3a4630564a72bad8c7b4d84e092e06b5132
gfs2-utils-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: 4f16f598d1127d84f4b978751d82055cSHA-256: 188b06b0d2ddbbe5ccfd9d9d09d9016aa49f9f912d225bd605fdaf61a35c8b5d
 
x86_64:
cluster-debuginfo-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: d3426b76e7313e0c6667ccd21c95d3ceSHA-256: c73b2119119c90cb81c4331a86bc525eeb871c2e649f1e297db679e5db6b0a82
cluster-debuginfo-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: a61e9c1c4a063246109f979233f47fbdSHA-256: 4dec5c41857cc5930e2cbe4a24c4f48db1935f4eb9f20b467249694c9334a439
clusterlib-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: b0ee113a63851fdc24ef31606348d606SHA-256: 86d1f6249f2897092c696e8ffd1da4851b83b0c3e17155187464d48459886f6f
clusterlib-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: e65cd0456f1ba01439cc5dff449ed69dSHA-256: 204d41d577c39f4d0b0befa1d8f85ca8f96600408cee330b8682d350f6a39b29
clusterlib-devel-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: 4d2f6f6a5f35d71ce023379d85c49282SHA-256: fa60a098a5abe0ca92a42849b655bb96d1577b635c510e358d4796671596cdb0
clusterlib-devel-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: 5d11070b6e385a580ea6d95946ef2231SHA-256: b22fab76a7af5f3bb9de6569cc4ea6a1fad95a2ac70e5c3b9857e1ae6f4be32a
cman-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: e0cea92e8f2bee81e57cc9f21c88a30cSHA-256: caa62d778e4d3e19cb7f8fd8ae1890d541ce6f63c617acb4cc1990ead8f22ee2
gfs2-utils-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: 508303f6e8b44e8ba2818f6d669fd128SHA-256: 42fade813b6512c4ca946387fe59451e2bf39ecaa2ee86131035d6806990edea
 
Red Hat Enterprise Linux Resilient Storage EUS (v. 6.5.z)

SRPMS:
cluster-3.0.12.1-59.el6_5.2.src.rpm
    MD5: f3e9cee0b01fc36c91e0f0cf7e3dfb5eSHA-256: d3d87612329c288aea74a278fade283816a54aa2c970cace7db185e3581f9ba4
 
IA-32:
cluster-debuginfo-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: d3426b76e7313e0c6667ccd21c95d3ceSHA-256: c73b2119119c90cb81c4331a86bc525eeb871c2e649f1e297db679e5db6b0a82
clusterlib-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: b0ee113a63851fdc24ef31606348d606SHA-256: 86d1f6249f2897092c696e8ffd1da4851b83b0c3e17155187464d48459886f6f
clusterlib-devel-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: 4d2f6f6a5f35d71ce023379d85c49282SHA-256: fa60a098a5abe0ca92a42849b655bb96d1577b635c510e358d4796671596cdb0
cman-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: df38f4db250a8ce833c69e8c2b0c903fSHA-256: 8173032d42808f6386c983471570f3a4630564a72bad8c7b4d84e092e06b5132
gfs2-utils-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: 4f16f598d1127d84f4b978751d82055cSHA-256: 188b06b0d2ddbbe5ccfd9d9d09d9016aa49f9f912d225bd605fdaf61a35c8b5d
 
x86_64:
cluster-debuginfo-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: d3426b76e7313e0c6667ccd21c95d3ceSHA-256: c73b2119119c90cb81c4331a86bc525eeb871c2e649f1e297db679e5db6b0a82
cluster-debuginfo-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: a61e9c1c4a063246109f979233f47fbdSHA-256: 4dec5c41857cc5930e2cbe4a24c4f48db1935f4eb9f20b467249694c9334a439
clusterlib-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: b0ee113a63851fdc24ef31606348d606SHA-256: 86d1f6249f2897092c696e8ffd1da4851b83b0c3e17155187464d48459886f6f
clusterlib-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: e65cd0456f1ba01439cc5dff449ed69dSHA-256: 204d41d577c39f4d0b0befa1d8f85ca8f96600408cee330b8682d350f6a39b29
clusterlib-devel-3.0.12.1-59.el6_5.2.i686.rpm
    MD5: 4d2f6f6a5f35d71ce023379d85c49282SHA-256: fa60a098a5abe0ca92a42849b655bb96d1577b635c510e358d4796671596cdb0
clusterlib-devel-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: 5d11070b6e385a580ea6d95946ef2231SHA-256: b22fab76a7af5f3bb9de6569cc4ea6a1fad95a2ac70e5c3b9857e1ae6f4be32a
cman-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: e0cea92e8f2bee81e57cc9f21c88a30cSHA-256: caa62d778e4d3e19cb7f8fd8ae1890d541ce6f63c617acb4cc1990ead8f22ee2
gfs2-utils-3.0.12.1-59.el6_5.2.x86_64.rpm
    MD5: 508303f6e8b44e8ba2818f6d669fd128SHA-256: 42fade813b6512c4ca946387fe59451e2bf39ecaa2ee86131035d6806990edea
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply