-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Some hosts don't have the /etc/cron.daily/apt file #14
Comments
Do you have access to a system that is affected by this? Can you check if the script is diverted ( Can you check the |
It's an Ubuntu VM on AWS. I don't see the file in dpkg-divert:
Actually, looking at the
|
So in that case the solution proposed in the other role probably wouldn't work... Is the compat script comparable to the normal Debian version, ie. does it at least run Any differences in the |
BTW, I just checked an Ubuntu 16.04 installation on one of my LXC containers and it's the same file looking at the checksum. So it's not an AWS issue, but an Ubuntu issue, it seems, at least that one release. |
Looks like the original script has been moved to |
The apt-compat script has a line
|
Check the status of the
This should tell you at least if the service is executed each day. |
I'm checking my syslog logs, but I see no trace that this apt-compat script was called … The apt-daily service seems to have been called:
The upgrades still seem to not have been installed, though:
Maybe I should give it another day to see if the necessary processes will kick in. |
Yeah, that would be a good way to check if it works unattended. Leave it for a bit and check back later. |
OK, after leaving everything to run for another day it seems that the My security upgrades are still not being installed, though:
After running the more verbose command
But the OS is notifying me that I do indeed have some security upgrades pending.
After running some suggested commands to get just the security updates packages, it seems that at least packages like tzdata should be handled by unattended upgrades, no?
All of my debops settings are default, except that I enabled automatic rebooting.
|
Can you check what is in the diverted configuration file ( I see that on Debian Jessie the package uses |
This is what I have in /etc/apt/apt.conf.d/50unattended-upgrades.dpkg-divert:
And this is what I have in /etc/apt/apt.conf.d/50unattended-upgrades:
When I placed the longer string from the diverted file into the normal file and rerun |
Fixing it in the role sounds like a good idea. Do you have other Ubuntu releases to check if it's a Xenial issue, or Ubuntu in general? |
I have a 14.04 at hand where I will try it too now. I don't get it, though – the differences in these two configurations is simply adding core, updates and proposed:
I don't see why the security upgrades aren't installed for the first case when we only have security. |
OK, so I tried it on a 14.04 VM that hasn't been upgraded in a while:
Packages with security updates:
Running the debops.unattended_upgrades playbook with only the security origin results in:
Adding the extra lines to the origins configuration (essentially I enabled It seems that for now (on Ubuntu 14.04 and 16.04 at least), this "release" option should be true if you want to get any upgrades (including security upgrades) installed. |
This /etc/cron.daily/apt file is supposed to trigger the
unattended-upgrades
command and it is missing in some cloud VMs. There was a lot written about this issue (on Stack Overflow, again, ServerFault, …).This was solved in a related unattended_upgrades Ansible playbook, so maybe their solution would work here too.
The text was updated successfully, but these errors were encountered: