*** Bug 484100 has been marked as a duplicate of this bug. ***
This bugzilla has Keywords: Regression. Since no regressions are allowed between releases, it is also being proposed as a blocker for this release. Please resolve ASAP.
I think there's an easier fix to this bug. The fence agent is using numerics OIDs everywhere so there's no need to pull in the MIB files. Just remove the "-m ALL" args from each of the commands.
Created attachment 331438 [details] Patch Patch from our master branch was used. I like solution with removing '-m ALL'. Unfortunately snmp commands can take MIBs also from other sources (eg. snmp.conf). That's why I believe that this patch is better solution.
Deleted Release Notes Contents. Old Contents: The Cluster Manager utility (cman) has been updated to version 2.0.97. This applies several bug fixes and enhancements, most notably: * cman now uses the following firmware versions: APC AOS v3.5.7 and APC rpdu v3.5.6. This fixes a bug that prevented the APC 7901 from using simple network management protocol (SNMP) properly. * fence_drac, fence_ilo, fence_egenera, and fence_bladecenter agents now support ssh. * fence_xvmd key files can now be reloaded without restarting. * A single fence method can now support up to 8 fence devices.
Release note added. If any revisions are required, please set the "requires_release_notes" flag to "?" and edit the "Release Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: Cause: Return status in SNMP is different Consequences: Fencing fails Fix: Add also non-numeric values to fence agents Result: Fencing works as expected
~~ Attention - RHEL 5.4 Beta Released! ~~ RHEL 5.4 Beta has been released! There should be a fix present in the Beta release that addresses this particular request. Please test and report back results here, at your earliest convenience. RHEL 5.4 General Availability release is just around the corner! If you encounter any issues while testing Beta, please describe the issues you have encountered and set the bug into NEED_INFO. If you encounter new issues, please clone this bug to open a new issue and request it be reviewed for inclusion in RHEL 5.4 or a later update, if it is not of urgent severity. Please do not flip the bug status to VERIFIED. Only post your verification results, and if available, update Verified field with the appropriate value. Questions can be posted to this bug or your customer or partner representative.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2009-1341.html