​Mario,

I use 'unattended-upgrades' on a couple hundred enduser desktop
workstations.  The idea being that most potential exploits in our
environment might be through end-user browser/surfing.

I choose not to use it on a few hundred servers, most of which are internal
or perform specialized scientific work, at this point in time.  We have a
very limited set of servers exposed to the Internet and we tend to manage
them manually. (see below for 'pdsh' and approach to servers)

I also have 'apper' installed with a change to the policy-kit rules to
allow ANYONE (at the console) to *update* packages, but not to install new
packages w/o root.  (dual-approach to updates, convenient if i ever have to
backout unattended-upgrades for some reason)

I enable the update-notifier-kde package as well (kingston-notifier?)
because 'apper's notifier popup doesn't reliably notify users of
reboot-required events, even though it is supposed to
('update-notifier-kde' was supposedly deprecated for this reason).
update-notifier-kde does trigger occasional popups successfully.

The hope here is that the end users will actually reboot the systems from
being prompted by update-notifier-kde when an automatic security patch
requiring reboot occurs.   I have limited success with that.  Probable
reasons are:
   - users are not easy to train -- we also have lots of transient visitors.
   - users do not want to interrupt workflow
   - users often run multi-day/week/month long scientific jobs
   - users may just not "get" that they really should reboot
   - Wheezy has been much worse than Squeeze for updates that trigger a
     required reboot.  Users may be getting "burnt-out" on the frequency.

while not strictly addressing your question w.r.t. "servers", my experience
with unattended-upgrades on the workstations over the past 3 years has been
good.   I setup e-mails to myself -- so i have been notified a few times
when a configuration file change blocks updates.

I have also setup 'apt-listbugs' on my systems, and 'unattended-upgrades'
will sometimes block hard, because it has an issue where 'apt-listbugs'
detects that ONE (or more) packages has a problem and returns a failcode
causing UA to abort the upgrade entirely (no piecemeal re-attempt).  This
requires manual intervention.  I have upped the threshhold on
'apt-listbugs' to critical to avoid that condition recurring frequently.

My experience in the past 10 years with Debian, is that i have maybe seen
ONE update that had some fallout that was at all inconvenient.

For my servers, i will typically use 'pdsh' (LLNL distributed shell) to
perform a global run of a forced updates.  ('pdsh' is very helpful here).

I use both 'dsh-group's for personal use, and an nfs-shared
/usr/local/etc/genders (libgenders) file which contains attributes like
'os=debian_linux' to select servers/systems to hit

so, something like (genders module in play):

   pdsh -lroot -g 'os=debian_linux&&hwtype=server' 'aptitude update -q=2 &&
aptitude safe-upgrade -q=2 --assume-yes ... {pkgs...}' 2>&1 | tee
upgrade.log

(it's important to use safe-upgrade, otherwise if you force-yes with
noninteractive in batch mode like this, aptitude can end up removing
packages if a package you specify doesn't have explicit dependency packages
also listed on the command line.  It's always a good idea to run this
command on one server first to make sure it doesn't end up doing something
you didn't mean to.  said from experience :-( )

(i'm at home and don't have the full invocations of Dpkg options for stuff
like retaining old configfiles and using noninteractive DPKG UI (via
env-var -- i can get that later, if you're interested)

--stephen
​


On Sat, Jan 31, 2015 at 1:58 AM, Ml Ml <[email protected]> wrote:

> Hello List,
>
> i have got about 50 Debian 6+7 Servers. They are doing all kind of
> things like Webserver, Mailserver, DNS, etc…
>
> I am using apticron to keep track of the updates, but i seem to use
> more and more time updating the hosts.
>
> Recently i came across the unattended-upgrade project
> https://wiki.debian.org/UnattendedUpgrades.
>
> Do you think it is a good idea to do security updates automatically? I
> just don’t want to wake up one morning not having ssh access to my
> Servers because an update broke everything. The servers are still very
> important. I should not crash them at any time. On the other hand i
> would like to be up2date with my security patches.
>
> Is anyone else facing the same problem? What are your experiences
> doing (blind) automatic security updates.
>
> Or are you maybe using something completly diffrent like puppet?
>
> Whats your practical experience with lots of servers?  (i am not
> interested in theoretical advises :-P )
>
> Thanks a lot,
> Mario
>
>
> --
> To UNSUBSCRIBE, email to [email protected]
> with a subject of "unsubscribe". Trouble? Contact
> [email protected]
> Archive:
> https://lists.debian.org/canfxojb-wbmsn3q4i4eqevvdnjbsg5wrskhdvrybebzgw5...@mail.gmail.com
>
>


-- 
Stephen Dowdy  -  Systems Administrator  -  NCAR/RAL
303.497.2869   -  [email protected]        -  http://www.ral.ucar.edu/~sdowdy/

Reply via email to