Can confirm:
[hloeung@dharkan tmp]$ ls /usr/share/doc/openssl -la
total 120
drwxr-xr-x3 root root 4096 Apr 4 18:43 .
drwxr-xr-x 1469 root root 61440 Apr 26 19:28 ..
lrwxrwxrwx1 root root30 Mar 31 17:42 changelog.Debian.gz ->
../libssl3/changelog.Debian.gz
lrwxrwxrwx1 root root
Public bug reported:
Hi,
Touchpad on my new Lenovo X1 Carbon (Gen12) with the Sensel haptic pad
doesn't work on boot. I see this:
| [Thu Apr 11 13:57:26 2024] i2c_hid_acpi i2c-SNSL0028:00: device did not ack
reset within 1000 ms
| [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001:
Confirmed the latest gnome-session fixes this.
| [hloeung@dharkan tmp]$ apt-cache policy unity-session gnome-session-bin
| unity-session:
| Installed: 46.0-1ubuntu3
| Candidate: 46.0-1ubuntu3
| Version table:
| *** 46.0-1ubuntu3 500
| 500 http://haw-test.archive.ubuntu.com/ubuntu
** Tags added: noble
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060426
Title:
DeprecationWarning: datetime.datetime.utcfromtimestamp() is deprecated
and scheduled for removal in a future
@vanvugt, it's `unity-session` shipping out
`/usr/lib/systemd/user/gnome-session.service` which is part of `gnome-
session`:
| $ dpkg-query -S /usr/lib/systemd/user/gnome-session.service
| unity-session: /usr/lib/systemd/user/gnome-session.service
$ chdist apt-get noble source unity-session
Public bug reported:
Hi,
Seeing this:
| /usr/lib/python3/dist-packages/dateutil/tz/tz.py:37: DeprecationWarning:
datetime.datetime.utcfromtimestamp() is deprecated and scheduled for removal in
a future version. Use timezone-aware objects to represent datetimes in UTC:
Public bug reported:
Hi,
`gnome-session.service` has the following:
| [Service]
| ExecStart=/bin/sh -exc '[ "$DESKTOP_SESSION" != "gnome-classic" ] || export |
GNOME_SHELL_SESSION_MODE=classic; \
| export GNOME_SESSION_XDG_SESSION_PATH=${XDG_SESSION_PATH}; \
| [ "$DESKTOP_SESSION" =
** Tags added: noble
** Also affects: gnome-session (Ubuntu Noble)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060266
Title:
gnome-session no longer
** Description changed:
Hi,
`gnome-session.service` has the following:
| [Service]
| ExecStart=/bin/sh -exc '[ "$DESKTOP_SESSION" != "gnome-classic" ] || export
| GNOME_SHELL_SESSION_MODE=classic; \
| export GNOME_SESSION_XDG_SESSION_PATH=${XDG_SESSION_PATH}; \
| [
I've not observed any problems or hindrance as a result of these
denials, no.
Just more noise and thought maybe Chromium was going to use the pressure
stall information for something useful like for the selection of which
tabs/process to kill off when the system is experiencing pressure in
either
It's used here:
|
https://github.com/chromium/chromium/blob/123.0.6312.58/chrome/browser/metrics/pressure/pressure_metrics_reporter.cc#L19
From this commit:
|
https://github.com/chromium/chromium/commit/dace5562b1d56bf2d2e5b2de6f4518c44844be9f
References this bug:
|
Sorry, I should have mentioned the version. I'm using the chromium from
the candidate channel:
| $ snap info chromium | grep installed
| installed: 123.0.6312.58 (2795) 168MB -
Seems to be happening every 10 mins.
--
You received this bug notification because you are a
Public bug reported:
Hi,
Currently seeing this:
| Mar 25 16:12:23 dharkan.local kernel: audit: type=1400
audit(1711343543.539:657): apparmor="DENIED" operation="open" class="file"
profile="snap.chromium.chromium" name="/proc/pressure/cpu" pid=63335
comm="ThreadPoolForeg" requested_mask="r"
Seeing this myself:
| $ sudo apt-get update
| Warning: The unit file, source configuration file or drop-ins of
apt-news.service changed on disk. Run 'systemctl daemon-reload' to reload units.
| Warning: The unit file, source configuration file or drop-ins of
esm-cache.service changed on disk.
For debugging, I provisioned VMs in Azure for each of the releases and
they all have this disabled:
| $ juju run --application
ubuntu-jammy-test,ubuntu-focal-test,ubuntu-bionic-test,ubuntu-xenial-test,ubuntu-trusty-test
"grep APT::Periodic::Download-Upgradeable-Packages
Maybe it is this as Grant (orndorffgrant) mentioned earlier?
| APT::Periodic::Download-Upgradeable-Packages "0";
During the time of a surge, we saw this:
| Hits h% Vis. v% Bandwidth Mtd ProtoData
| - -- - -- ---
| 3772 0.82% 2461
Public bug reported:
Hi,
Running `flake8` `5.0.4-4` included with Noble, I'm getting the
following errors:
| ]$ flake8 pe.py
| Traceback (most recent call last):
| File "/usr/lib/python3/dist-packages/flake8/plugins/finder.py", line 296,
in _load_plugin
| obj = plugin.entry_point.load()
** Also affects: hundredpapercuts
Importance: Undecided
Status: New
** Changed in: etckeeper (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1598304
** Also affects: hundredpapercuts
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1986739
Title:
etckeeper cron spam => please pass --quiet to `bzr commit`
** Also affects: hundredpapercuts
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1922960
Title:
ieee-data monthly cron job in Xenial probably DDoSes
** Also affects: breezy (Ubuntu Mantic)
Importance: Undecided
Status: New
** Also affects: breezy (Ubuntu Noble)
Importance: Undecided
Status: Confirmed
** Summary changed:
- Unable to get a copy of private bzr repositories using 'bzr branch' on mantic
+ Unable to get a copy
The workaround doesn't work for me?
| [hloeung@dharkan tmp]$ bzr branch lp+bzr:canonical-sshebang
| ...
|
| lazr.restfulclient.errors.ServerError: HTTP Error 500: Internal Server Error
| Response headers:
| ---
| connection: close
| content-length: 14
| content-type: text/plain;charset=utf-8
|
** Changed in: fontconfig (Ubuntu)
Status: Triaged => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054924
Title:
color emoji are broken with fontconfig 2.15
To manage
The workaround detailed upstream works for me - removing
/etc/fonts/conf.d/70-no-bitmaps.conf and re-generating your fonts cache.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054924
Title:
color
> From debugging sshd, I can see the override file is indeed being read,
and the option is supposedly set. But after testing, the options are not
taking effect.
From debugging, do you see /etc/ssh/sshd_config being read first?
For OpenSSH, at least with the client side, the first defined value
Public bug reported:
Hi,
The current logrotate config is as follows:
===
/var/log/conntrackd-stats.log {
weekly
rotate 2
missingok
postrotate
invoke-rc.d conntrackd restart > /dev/null
endscript
}
===
This causes weekly restarts of conntrackd. Can we switch to
I think you want package updates from Ubuntu ESM, in particular ca-
certificates 20190110~14.04.1~esm2.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928989
Title:
expiring trust anchor
Looks fixed in more recent versions.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957128
Title:
ifenslave fails to detach slave from bonded interface
To manage notifications about this bug go
Public bug reported:
Hi,
When I try to detach a slave from a bonded interface, it fails as
follows:
| [hloeung@myhost etc]$ sudo ifenslave -v -d bond0 ens2f1
| ens2f1: is not enslaved to bond0
It's definitely part of the bond:
| [hloeung@myhost etc]$ ls /sys/class/net/bond0/ -la | grep ens
|
Public bug reported:
Hi,
Per the Intel community [1], for Intel X710 controllers, the NIC is
meant to handle LLDP directly. Unfortunately, this doesn't play well
with lldpd:
| hloeung@cumulus:mgmt:~$ net show lldp | grep swp24
| swp24 10GTrunk/L237383638-3530-5A43-3238-30423954
Hirsute verified - https://paste.ubuntu.com/p/Zs6vG7M6Jf/
| real1m46.509s
vs.
| real0m43.891s
Impish verified - https://paste.ubuntu.com/p/yWW4k8Jy79/
| real1m14.348s
vs.
| real0m27.687s
** Tags removed: verification-needed verification-needed-hirsute
Tested on a Focal VM in Canonistack.
Using current ipset:
| ubuntu@juju-87625f-hloeung-110:~$ sudo apt-get install ipset
| ...
| Get:1 http://us.archive.ubuntu.com/ubuntu focal/main amd64 libipset13 amd64
7.5-1~exp1 [53.4 kB]
| Get:2 http://us.archive.ubuntu.com/ubuntu focal/main amd64 ipset
Public bug reported:
Hi,
Is there a way to list the previous revisions of a snap in a specific
channel and then allow the snap client to revert or install specific
revisions?
I understand `snap revert` exists, but it only allows to revert to the
last installed and that's it.
My use case is
On Thu, Sep 02, 2021 at 05:39:23PM -, Brian Murray wrote:
> I think part of the point of having the cronjob is to mail the system
> administrator and let them know that a new release of Ubuntu is
> available. That being said I do feel like sending the email every week
> until the system
** Description changed:
Hi,
The bundled nmap-mac-prefixes dates back to 2019:
| # $Id: nmap-mac-prefixes 37638 2019-05-28 21:35:45Z dmiller $ generated
with make-mac-prefixes.pl
| # Original data comes from http://standards.ieee.org/regauth/oui/oui.txt
| # These values are known
Public bug reported:
Hi,
The bundled nmap-mac-prefixes dates back to 2019:
| # $Id: nmap-mac-prefixes 37638 2019-05-28 21:35:45Z dmiller $ generated with
make-mac-prefixes.pl
| # Original data comes from http://standards.ieee.org/regauth/oui/oui.txt
| # These values are known as
LGTM, thanks!
| ubuntu@juju-87625f-hloeung-66:~$ cp /etc/cron.weekly/update-notifier-common ~/
| ubuntu@juju-87625f-hloeung-66:~$ sudo apt-get update
| ...
| Get:8 http://us.archive.ubuntu.com/ubuntu bionic-proposed/main amd64 Packages
[104 kB]
| ...
| ubuntu@juju-87625f-hloeung-66:~$ sudo
** Changed in: ipset (Ubuntu Focal)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918936
Title:
ipset does NSS lookups even if ports are numeric
To manage
Public bug reported:
Hi,
We get these cron spam weekly:
| Received: by mysystem.mydomain.local (Postfix)
| id B19E32E806B; Sun, 15 Aug 2021 06:47:03 + (UTC)
| Delivered-To: root@mysystem.mydomain.local
| Received: by mysystem.mydomain.local (Postfix, from userid 0)
| id
Thanks Brian (brian-murray) for sponsoring this change.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475
Title:
[SRU] update-notifier-common weekly cron job runs at the same time for
all
Looks good to me:
| ubuntu@juju-87625f-hloeung-100:/etc/apt$ sudo apt-get install
update-notifier-common
| Reading package lists... Done
| Building dependency tree
| Reading state information... Done
| The following packages were automatically installed and are no longer
required:
|
@waveform, perfect, thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475
Title:
[SRU] update-notifier-common weekly cron job runs at the same time for
all computers across the globe
To
Something similar was done for checking for the latest Ubuntu release
and updating the MOTD in LP:1836475. It switches the download part into
a systemd timer
(https://launchpadlibrarian.net/505544658/lp1836475-focal.debdiff). So
maybe something similar here where the timer job checks existence and
Sorry for the noise, this is my dpkg-divert to disable git support per
LP:1868200.
** Changed in: breezy (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1935731
Public bug reported:
Hi,
Install brz from Hirsute fails:
| Selecting previously unselected package python3-breezy.
| Preparing to unpack .../4-python3-breezy_3.1.0-8_amd64.deb ...
| Unpacking python3-breezy (3.1.0-8) ...
| Selecting previously unselected package brz.
| Preparing to unpack
** Patch added: "ipset.patch"
https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+attachment/5507474/+files/ipset.patch
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918936
Title:
Apologies, can we update it to using the attached patch?
It includes the fix by Jozsef from upstream:
"""
Fix patch "Parse port before trying by service name"
The patch broke parsing service names: number parsing failures
are hard errors which erase data, thus making impossible to
parse input as
Per discussion on Mattermost, the original behavior was to try
string_to_u16() before parse_portname(). This was switched in upstream
commit
https://git.netfilter.org/ipset/tree/lib/parse.c?id=516600858cb54906fb728d04e5edf1131ee7b3b2
and released with ipset v6.37.
--
You received this bug
On Mon, Jun 14, 2021 at 04:16:28PM -, Robie Basak wrote:
> > I'm keen to try and avoid handling any more complex (arbitrary)
> customisations
>
> I agree! I think I prefer adding a random sleep for the SRU for this
> reason, even if the appropriate fix for the development release that
> landed
** Branch linked: lp:~hloeung/ubuntu-repository-cache/squid-logging-
human-sensible-timestamps
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1780341
Title:
squid should default to more human
We're also seeing this with rsyncd:
| Apr 28 09:35:04 behaim rsync[2152929]: *** stack smashing detected
***: terminated
>From apt history logs:
| Upgrade: libldap-2.4-2:amd64 (2.4.49+dfsg-2ubuntu1.7,
2.4.49+dfsg-2ubuntu1.8), libc6-dev:amd64 (2.31-0ubuntu9.2, 2.31-0ubuntu9.3),
Example entries in ipset used for testing:
| add test 10.1.1.0/21,80,150.222.129.122/31
| add test 10.1.1.0/21,80,150.222.129.124/31
| add test 10.1.1.0/21,80,150.222.129.126/31
We're not specifying the protocol to avoid the just as expensive
getprotobyname() lookup.
--
You received this bug
Current size of ipset used for testing:
| ubuntu@juju-87625f-hloeung-93:~/ipset$ wc -l ~/whitelist-ipv4
| 515698 /home/ubuntu/whitelist-ipv4
With the patch:
| ubuntu@juju-87625f-hloeung-93:~/ipset$ sudo ipset destroy test
| ubuntu@juju-87625f-hloeung-93:~/ipset$ sudo ipset create test
FWIW, these were the main Ubuntu Archive servers.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1904369
Title:
systemd 100% CPU; constantly reading service for socket activation
To manage
Sorry about not providing further details on this bug. We ended up
switching the last of our systems to xinetd so can no longer reproduce
and provide the information required.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
What does 'journalctl -xe' say? Also anything interesting in
/var/log/syslog?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1913216
Title:
unbound DNS service crashing/not starting
To manage
Any updates with regards to getting this backported to Focal?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475
Title:
[SRU] update-notifier-common weekly cron job runs at the same time for
@mruffell, that's for Bionic, but for Focal is that still
5.4.0-56-generic? Or is there a new respun kernel to include these
patches?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1898786
Title:
I tried to verify this but it looks like it was removed from focal-
proposed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475
Title:
[SRU] update-notifier-common weekly cron job runs at the
Adding '--no-nvram' as advised by Robert in #5 seems to work.
Without:
| ubuntu@machine-0:~$ sudo /usr/lib/grub/grub-multi-install --target=x86_64-efi
| Installing grub to /boot/efi.
| Installing for x86_64-efi platform.
| grub-install: warning: Internal error.
| grub-install: error: failed to
Other user reports - https://github.com/actions/virtual-
environments/issues/1605
** Bug watch added: github.com/actions/virtual-environments/issues #1605
https://github.com/actions/virtual-environments/issues/1605
--
You received this bug notification because you are a member of Ubuntu
Public bug reported:
Hi,
We recently switched to using systemd's socket activation for per-client
limits. The configs are as follows:
| $ ls -la /etc/systemd/system/sockets.target.wants/rsyncd.socket
| lrwxrwxrwx 1 root root 33 Aug 25 00:09
Attached /var/log/syslog.
** Attachment added: "syslog"
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1902960/+attachment/5431334/+files/syslog
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Spun up a new unit in Azure and also ran into this:
| https://paste.ubuntu.com/p/zd6z8dZ5Zr/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1902960
Title:
Upgrade from 245.4-4ubuntu3.3 to
Public bug reported:
Hi,
Seeing a bunch of these across various units, all of which were recently
provisioned in Azure:
| ubuntu@machine-1:~$ sudo apt-get dist-upgrade
| Reading package lists... Done
| Building dependency tree
| Reading state information... Done
| Calculating upgrade... Done
|
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1900438
Title:
Bcache bypasse writeback on caching device with fragmentation
To
** Description changed:
Hello,
In short, we faced an issue with a huge IO wait on a bionic Ubuntu
4.15.0-118.119-generic kernel.
- This is the full list of process and the kernel function they were stuck in
[2].
+ This is the full list of process and the kernel function they were stuck
This just happened with conntrack metrics below:
| * 20200920-0647
| 629385 dst=91.189.95.15
|
| * 20200920-0648
| 1444902 dst=91.189.95.15
|
| * 20200920-0649
| 1044261 dst=91.189.95.15
With request logs showing a surge in this:
| xxx.xxx.xxx.xxx - - [20/Sep/2020:06:46:34 +] "GET
We're still seeing regular request spikes to changelogs.ubuntu.com. Can
we move release-upgrade-motd, the bit that downloads and checks for a
new Ubuntu release to systemd timer units instead?
/usr/lib/ubuntu-release-upgrader/release-upgrade-motd which calls
*** This bug is a duplicate of bug 1836475 ***
https://bugs.launchpad.net/bugs/1836475
Public bug reported:
Hi,
We see frequent request spikes to changelogs.ubuntu.com. It turns out
it's related to the release-upgrade-motd being called from cron.weekly.
Can we spread this out over a period
** Also affects: landscape-client (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893716
Title:
scripts in /etc/update-motd.d/ run even on login
** Also affects: base-files (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893716
Title:
scripts in /etc/update-motd.d/ run even on login via
Looks good to me, thanks:
| https://paste.ubuntu.com/p/D3BfjqzR4t/
** Tags removed: verification-needed verification-needed-xenial
** Tags added: verification-done verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Good to hear it isn't something on our end. Thanks for the update.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1888058
Title:
Got “Authentication failed” while running do-release-upgrade from
** Changed in: apache2 (Debian)
Importance: Unknown => Undecided
** Changed in: apache2 (Debian)
Remote watch: Debian Bug tracker #565626 => None
** Changed in: apache2 (Debian)
Importance: Undecided => Medium
--
You received this bug notification because you are a member of Ubuntu
** Changed in: vlan (Debian)
Importance: Unknown => Medium
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1541678
Title:
if-post-down.d/vlan and if-pre-up.d/vlan should support predictable
NIC
** Changed in: nicstat (Debian)
Importance: Unknown => Low
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1487190
Title:
Not all interfaces display when >~30 interfaces
To manage notifications
** Changed in: ntp (Debian)
Importance: Unknown => Low
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/583994
Title:
Consider replacing ntpdate calls by 'ntpd -g'
To manage notifications about
** Changed in: apache2 (Debian)
Importance: Unknown => Medium
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/245219
Title:
Ubuntu archive server returning incorrect content-encoding - content-
** Changed in: mtr (Debian)
Importance: Unknown => Medium
** Changed in: mtr (Ubuntu)
Status: In Progress => Confirmed
** Changed in: mtr (Ubuntu)
Importance: Undecided => Medium
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Changed in: apache2 (Debian)
Importance: Unknown => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1832182
Title:
systemd unable to detect running apache if invoked via "apache2ctl
** Changed in: mesa
Importance: Unknown => Undecided
** Changed in: mesa
Remote watch: gitlab.freedesktop.org/mesa/mesa/issues #727 => None
** Changed in: mesa
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
** Changed in: distribute (Ubuntu)
Status: Confirmed => Won't Fix
** Changed in: tahoe-lafs
Importance: Unknown => Undecided
** Changed in: tahoe-lafs
Remote watch: Tahoe-LAFS Trac #1235 => None
** Changed in: tahoe-lafs
Status: New => Won't Fix
--
You received this bug
** Changed in: libvdpau (Debian)
Importance: Unknown => Undecided
** Changed in: libvdpau (Debian)
Remote watch: Debian Bug tracker #617940 => None
** Changed in: libvdpau (Debian)
Importance: Undecided => Medium
** Changed in: libvdpau (Debian)
Status: New => Confirmed
--
You
I'm not sure why this is a problem now as the old archive servers were
doing the same thing. In any case, I've added the following to apache2
configs:
| AddType application/pgp-signature .gpg
Testing without:
> GET
> /ubuntu/dists/focal-updates/main/dist-upgrader-all/current/focal.tar.gz.gpg
I'm not sure why this is a problem now as the old archive servers were
doing the same thing. In any case, I've added the following to apache2
configs:
| AddType application/pgp-signature .gpg
Testing without:
> GET
> /ubuntu/dists/focal-updates/main/dist-upgrader-all/current/focal.tar.gz.gpg
Installed packages from Bryce's PPA and confirmed no more '(35)Resource
deadlock avoided: AH02026: Failed to acquire SSL session cache lock'
logged.
See https://pastebin.ubuntu.com/p/bFJ9C5hFCD/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
Unfortunately, I'm not sure how best to reproduce this. I can tell you
that we were seeing this on really busy units.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1565744
Title:
"Mutex
Can we get the following backported to Xenial (so 2.4.18-2ubuntu3.14)?
| apache2 (2.4.20-1) unstable; urgency=medium
|
| * On Linux, use pthread mutexes. On kfreebsd/hurd, continue using fctnl
| because they lack robust pthred mutexes. LP: #1565744, #1527044
Seeing it on a couple of Xenial
Eoan:
| https://pastebin.ubuntu.com/p/gWFFFJdP2d/
** Tags removed: verification-needed verification-needed-eoan
** Tags added: verification-done verification-done-eoan
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Tested with the packages from *-proposed. Looks good.
Bionic:
| https://pastebin.ubuntu.com/p/gkw5JWqtN7/
Focal:
| https://pastebin.ubuntu.com/p/rJgmHhfJ6v/
** Tags removed: verification-needed-bionic verification-needed-focal
** Tags added: verification-done-bionic verification-done-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875517
Title:
check_http inefficient and sometimes times out
To manage notifications about this bug go to:
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875517
Title:
check_http inefficient and sometimes times out
To manage notifications about this bug go to:
I set something up for you to test:
| /usr/lib/nagios/plugins/check_http -p 443 --ssl -H
people.canonical.com -j GET -u '/~hloeung/tmp/lp1875517-test.txt' -r
haproxy -t 60
Without the patch, it's ~25secs. With reduces that to under 1sec.
This works for testing too (~2secs vs. ~0.1secs):
|
On Thu, Apr 30, 2020 at 03:01:28PM -, Rafael David Tinoco wrote:
> I need some clarification here. You have applied a temporary mitigation
> that improves check_http by not constantly freeing and allocating heap
> memory. You have indicated upstream patches (2 of them) dealing with the
>
Public bug reported:
Hi,
We operate archive.ubuntu.com as well as mirrors of it in various
places. We're getting reports of various CI/CD jobs failing. Sometimes
due to routing issues, issues with overloaded servers/VMs hosting
archive, etc.
Any chance we can make '-o Acquire::Retries=3' the
** Also affects: monitoring-plugins (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects: monitoring-plugins (Ubuntu Groovy)
Importance: Undecided
Status: Confirmed
** Also affects: monitoring-plugins (Ubuntu Eoan)
Importance: Undecided
Status: New
--
** Also affects: monitoring-plugins (Ubuntu Bionic)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875517
Title:
check_http inefficient and sometimes
Tested in my PPA:
| https://launchpad.net/~hloeung/+archive/ubuntu/nagios-nrpe/+packages
With output:
| $ time ./check_http -I 127.0.0.1 -p 9103 -u /metrics -r haproxy_rate -t 50
| HTTP OK: HTTP/1.0 200 OK - 13239810 bytes in 1.157 second response time
|time=1.156696s;;;0.00;50.00
Public bug reported:
Hi,
We're frequently seeing socket timeouts with some checks using the
check_http plugin. It seems this is a known issue with some fixes
upstream:
|
https://github.com/nagios-plugins/nagios-plugins/commit/2b38350d546ef9632ccd90e300eeaf6eda0ca32c
|
1 - 100 of 672 matches
Mail list logo