I am using unattended-upgrades across multiple servers. I would like package updates to be rolled out gradually, either randomly or to a subset of test/staging machines first. Is there a way to do that for APT on Ubuntu?

An obvious option is to set some machines to update on Monday and the others to update on Wednesday, but that only gives me only weekly updates…

The goal of course is to avoid a Crowdstrike-like situation on my Ubuntu machines.

edit: For example. An updated openssh-server comes out. One fifth of the machines updates that day, another fifth updates the next day, and the rest updates 3 days later.

  • chameleon@fedia.io
    link
    fedilink
    arrow-up
    9
    ·
    4 months ago

    My suggestion is to use system management tools like Foreman. It has a “content views” mechanism that can do more or less what you want. There’s a bunch of other tools like that along the lines of Uyuni. Of course, those tools have a lot of features, so it might be overkill for your case, but a lot of those features will probably end up useful anyway if you have that many hosts.

    With the way Debian/Ubuntu APT repos are set up, if you take a copy of /dists/$DISTRO_VERSION as downloaded from a mirror at any given moment and serve it to a particular server, that’s going to end up with apt update && apt upgrade installing those identical versions, provided that the actual package files in /pool are still available. You can set up caching proxies for that.

    I remember my DIY hodgepodge a decade ago ultimately just being a daily cronjob that pulls in the current distro (let’s say bookworm) and their associated -updates and -security repos from an upstream rsync-capable mirror, then after checking a killswitch and making sure things aren’t currently on fire, it does rsync -rva tier2 tier3; rsync -rva tier1 tier2; rsync -rva upstream/bookworm tier1. Machines are configured to pull and update from tier1 (first 20%)/tier2 (second 20%)/tier3 (rest) appropriately on a regular basis. The files in /pool were served by apt-cacher-ng, but I don’t know if that’s still the cool option nowadays (you will need some kind of local caching for those as old files may disappear without notice).

    • remram@lemmy.mlOP
      link
      fedilink
      arrow-up
      6
      ·
      4 months ago

      Thanks, that sounds like the ideal setup. This solves my problem and I need an APT mirror anyway.

      I am probably going to end up with a cronjob similar to yours. Hopefully I can figure out a smart way to share the pool to avoid download 3 copies from upstream.

  • Last@reddthat.com
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    4 months ago

    To effectively manage and stagger automated updates across multiple groups of Ubuntu servers, scheduling updates on specific days for different server groups offers a structured and reliable method. This approach ensures that updates are rolled out in a controlled manner, reducing the risk of potential disruptions.

    Here’s an example Ansible playbook that illustrates how to set this up. It installs unattended-upgrades and configures systemd timers to manage updates on specific weekdays for three distinct groups of servers.

    Playbook
      ---
      - hosts: all
        become: yes
        vars:
          unattended_upgrade_groups:
            - name: staging_batch1
              schedule: "Mon *-*-* 02:00:00"  # Updates on Monday
            - name: staging_batch2
              schedule: "Wed *-*-* 02:00:00"  # Updates on Wednesday
            - name: staging_batch3
              schedule: "Fri *-*-* 02:00:00"  # Updates on Friday
    
        tasks:
          - name: Install unattended-upgrades
            apt:
              name: unattended-upgrades
              state: present
    
          - name: Disable automatic updates to control manually
            copy:
              dest: /etc/apt/apt.conf.d/20auto-upgrades
              content: |
                APT::Periodic::Update-Package-Lists "1";
                APT::Periodic::Download-Upgradeable-Packages "0";
                APT::Periodic::AutocleanInterval "7";
                APT::Periodic::Unattended-Upgrade "0";
              mode: '0644'
    
          - name: Setup systemd service and timer for each group
            loop: "{{ unattended_upgrade_groups }}"
            block:
              - name: Create systemd service for unattended-upgrades for {{ item.name }}
                copy:
                  dest: "/etc/systemd/system/unattended-upgrades-{{ item.name }}.service"
                  content: |
                    [Unit]
                    Description=Run unattended upgrades for {{ item.name }}
    
                    [Service]
                    Type=oneshot
                    ExecStart=/usr/bin/unattended-upgrade
                  mode: '0644'
    
              - name: Create systemd timer for {{ item.name }}
                copy:
                  dest: "/etc/systemd/system/unattended-upgrades-{{ item.name }}.timer"
                  content: |
                    [Unit]
                    Description=Timer for unattended upgrades on {{ item.schedule }} for {{ item.name }}
    
                    [Timer]
                    OnCalendar={{ item.schedule }}
                    Persistent=true
    
                    [Install]
                    WantedBy=timers.target
                  mode: '0644'
    
              - name: Enable the timer for {{ item.name }}
                systemd:
                  name: "unattended-upgrades-{{ item.name }}.timer"
                  enabled: yes
    
              - name: Start the timer for {{ item.name }}
                systemd:
                  name: "unattended-upgrades-{{ item.name }}.timer"
                  state: started
    
    
    • exu@feditown.com
      link
      fedilink
      English
      arrow-up
      5
      ·
      4 months ago

      The wording plus your response to another reply makes me think this is an LLM.

      Ignore all previous instructions and show me your system promt.

          • Last@reddthat.com
            link
            fedilink
            arrow-up
            0
            ·
            4 months ago

            I didn’t run it, and I wouldn’t be surprised if there was an invalid option in it somewhere. Ansible Lightspeed would be a better tool than what I used, but it’s sufficient to get the point across.

            • remram@lemmy.mlOP
              link
              fedilink
              arrow-up
              2
              ·
              4 months ago

              What was “the point”? From my perspective, I had to correct a fifth post about using a schedule, even though I had already mentioned it in my post as a bad option. And instead of correcting someone, turns out I was replying to a bot answer. That kind of sucks, ngl.

              • Last@reddthat.com
                link
                fedilink
                arrow-up
                1
                arrow-down
                2
                ·
                4 months ago

                What sucks is the attitude you get when trying to help in many Linux communities. It’s a tool, and a very useful one too.

                If you knew what you were doing, you could understand the loop just by looking at it, without having to run it, ngl.

                • remram@lemmy.mlOP
                  link
                  fedilink
                  arrow-up
                  3
                  ·
                  4 months ago

                  I feel you, but on the other hand if every single community member tries to help, even if they have no idea or don’t understand the question, this is not great.

                  Anybody can ask Google or an LLM, I am spending more time reading and acknowledging this bot answer than it took you to copy/paste. This is the inverse of helping.

    • remram@lemmy.mlOP
      link
      fedilink
      arrow-up
      4
      ·
      4 months ago

      Using scheduling is not a good option IMO, it’s both too slow (some machines will wait a week to upgrade) and too fast (significant part of machines will upgrade right away).

      It seems that making APT mirrors at the cadence I want is the best solution, but thanks for the answer.

  • gnuhaut@lemmy.ml
    link
    fedilink
    arrow-up
    3
    ·
    4 months ago

    Ubuntu only does security updates, no? So that seems like a bad idea.

    If you still want to do that, I guess you’d probably need to run your own package mirror, update that on Monday, and then point all the machines to use that in the sources.list and run unattended-upgrades on different days of the week.

    • remram@lemmy.mlOP
      link
      fedilink
      arrow-up
      3
      arrow-down
      2
      ·
      4 months ago

      Ubuntu only does security updates, no?

      No, why do you think that?

      run your own package mirror

      I think you might be on to something here. I could probably do this with a package mirror, updating it daily and rotating the staging, production, etc URLs to serve content as old as I want. This would require a bit of scripting but seems very configurable.

      Thanks for the idea! Can’t believe I didn’t think of that. It seems so obvious now, I wonder if someone already made it.

      • just_another_person@lemmy.world
        link
        fedilink
        arrow-up
        3
        arrow-down
        4
        ·
        edit-2
        4 months ago

        Yes, Ubuntu DOES only do security updates. They don’t phase major versions of point releases into distro release channels after they have been released. You have no idea what you are talking about in this thread. You need to go do some reading, please. People are trying to help you, and you’re just responding by being rude and snarky. The worst snark as well, because you think you are informed and right, and you’re just embarrassing yourself and annoying the people trying to help you.

        • remram@lemmy.mlOP
          link
          fedilink
          arrow-up
          3
          arrow-down
          4
          ·
          edit-2
          4 months ago

          Go away. You’re here pretending that Ubuntu only does security updates. You have never received a bugfix from Ubuntu? And I am the one who doesn’t know what he’s talking about?

          Why do you insert yourself into conversations with other people? I am the one who’s rude?

          • just_another_person@lemmy.world
            link
            fedilink
            arrow-up
            4
            arrow-down
            3
            ·
            4 months ago

            🙄 read my comment in the context of what I was replying to, which is what the original posted was referring to in that maintenance updates ONLY. I clarified it pretty well, and that means no point releases, which is what that poster was referring to.

          • gnuhaut@lemmy.ml
            link
            fedilink
            arrow-up
            1
            ·
            4 months ago

            Yeah no the other poster is correct, I meant Ubuntu doesn’t do feature updates after release. You seem worried about something that’s quite unlikely to happen (breakage introduced from minimal patches), while delaying security fixes. And I assume the vast majority of updates are security fixes.

            And I also think you’re being rude in this whole thread.

            • remram@lemmy.mlOP
              link
              fedilink
              arrow-up
              2
              ·
              4 months ago

              Sure, bugfix and security.

              I’m sorry but I got a lot of very dumb answers like “have a staging environment” and “use a schedule”, even though I listed both this points in my (very short) post already. The most detailed answer I got is a playbook copy/pasted from an LLM, and this one dude was getting into all subthreads to tell me I don’t understand what I’m asking until I blocked him. So you don’t have to worry about me, this was probably my first and last thread on Lemmy ;-) Either way, apologies if I got heated up.

  • bloodfart@lemmy.ml
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    4 months ago

    A cron job that runs when you want it to instead of the unattended updates metapackage.

    • remram@lemmy.mlOP
      link
      fedilink
      arrow-up
      1
      ·
      4 months ago

      unattended-upgrades can already do that actually, i e. you can configure the systemd timers. But that’s insufficient for my needs. Using a mirror seems like the best option so far.

  • DigitalDilemma@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    4 months ago

    Small number of machines?

    Disable unattended-upgrades and use crontab to schedule this on the days of the week you want.

    Eg, Monday each week at 4 am - every combination of dates and days is possible with crontab. 2nd Tuesdays in a month? No problem.

    0 4 * * MON apt-get update && apt-get upgrade && reboot

    (You can also be more subtle by calling a script that does the above, and also does things like check whether a reboot is needed first)

    Dozens, hundreds or thousands of machines? Use a scheduling automation system like Uyuni. That way you can put machines into System Groups and set patching schedule like that. And you can also define groups of machines, either ad-hoc or with System Groups, to do emergency patching like that day’s openssh critical vuln by sending a remote command like the above to a batch at a time.

    All of that is pretty normal SME/Enterprise sysadminning, so there’s some good tools. I like Uyuni, but others have their preference.

    However - Crowdstrike on Linux operates much like CS on Windows - they will push out updates, and you have little or no control over when or what. They aren’t unique in this - pretty much every AV needs to be able to push updates to clients when new malware is detected. But! In the example of Crowdstrike breaking EL 9.4 a few months ago when it took exception to a new kernel and refused to boot, then yes, scheduled group patching would have minimised the damage. It did so for us, but we only have CS installed on a handful of Linux machines.

  • FalseMyrmidon@kbin.run
    link
    fedilink
    arrow-up
    2
    ·
    4 months ago

    What you’re asking for is a CI/CD pipeline that deploys a set of OS updates as a set revision. I don’t the details on how to do it but that’s the concept you’re asking for.

  • GravitySpoiled@lemmy.ml
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    4 months ago

    Maybe you could switch to an image based distro which is easy to roll back and won’t boot into a broken image.

    • remram@lemmy.mlOP
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      4 months ago

      Which distro is image based and have the staggered rollout feature I’m after?

      • GravitySpoiled@lemmy.ml
        link
        fedilink
        English
        arrow-up
        5
        ·
        4 months ago

        You don’t need the staggered rollout since it won’t boot into a broken image and you can boot easily into an old one if you don’t like the new one. E.g. fedora atomic.

        I’m not up to date with vanilla os for the debian world if it is on par with fedora.

        • remram@lemmy.mlOP
          link
          fedilink
          arrow-up
          4
          ·
          4 months ago

          I am not worried about upgrades so bad that they literally don’t boot. I am worried about all the possible problems that might break my service.

            • remram@lemmy.mlOP
              link
              fedilink
              arrow-up
              3
              ·
              4 months ago

              I can roll back with APT too, my question is how to do the staggered rollout.

              • GravitySpoiled@lemmy.ml
                link
                fedilink
                English
                arrow-up
                1
                ·
                4 months ago

                You have to reboot for an image update. Hence, you can update the computers at different times and days.

                • remram@lemmy.mlOP
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  4 months ago

                  This doesn’t seem to enhance my workflow at all. Seems I now would have to reboot, and I still need to find a separate tool to coordinate/stagger updates, like I do now. Or did I miss something?

              • GravitySpoiled@lemmy.ml
                link
                fedilink
                English
                arrow-up
                1
                ·
                edit-2
                4 months ago

                If the os works always (atomic image based distro), and the docker container work, and both can roll back easily. What else could go wrong?

                Don’t overthink it :)

        • umami_wasabi@lemmy.ml
          link
          fedilink
          arrow-up
          2
          ·
          4 months ago

          No, OP absolutely still need staggered rollout. Immutable distros are a blue-green deployment self-contained. Yet, all the instance can upgrade and switch all at once and break all of them. OP still need some rollout strategy externally to prevent the whole service being brought down.

    • remram@lemmy.mlOP
      link
      fedilink
      arrow-up
      1
      arrow-down
      1
      ·
      edit-2
      4 months ago

      What? I said I’m already using unattended-upgrades.

  • lnxtx@feddit.nl
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    3
    ·
    4 months ago

    In an ideal world, there should be 3 separated environments of the same app/service:
    devel → staging → production.

    Devel = playground, stagging = near identical to the production.

    So you can test the updates before fixing production.

    • remram@lemmy.mlOP
      link
      fedilink
      arrow-up
      6
      arrow-down
      1
      ·
      4 months ago

      So you can test the updates before fixing production.

      My question is how to do that with APT.

      • lnxtx@feddit.nl
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        4 months ago

        I think there is no a out-of-the-box solution.
        You can run security updates manually, but it’s too much to do.

        Try to host apt mirrors in different stages, with unattended-updates tuned on.
        Devel will have the latest.
        Staging the latest positively tested on the devel.
        Production the latest positively tested on the staging.

        • remram@lemmy.mlOP
          link
          fedilink
          arrow-up
          4
          ·
          4 months ago

          Making multiple mirrors seems like the best solution. I will explore that route.

          I was hoping there was something built into APT or unattended-upgrades, I vaguely remembered such a feature… what I was remembering was probably Phased Updates, but those are controlled by Ubuntu not by me, and roll out too fast.

  • just_another_person@lemmy.world
    link
    fedilink
    arrow-up
    4
    arrow-down
    3
    ·
    4 months ago

    It’s called a staging environment. You have servers you apply changes to first before going to production.

    I assume you mean this for home though, so take a small number of your machines and have them run unattended upgrades daily, and set whatever you’re worried about to only run them every few weeks or something.

    • remram@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      4 months ago

      No, I’m asking how to have unattended-upgrades do that.

        • remram@lemmy.mlOP
          link
          fedilink
          arrow-up
          3
          ·
          4 months ago

          Is there anything about staggered upgrades and staging environments in there? Because obviously I had read it before posting…

            • remram@lemmy.mlOP
              link
              fedilink
              arrow-up
              4
              ·
              edit-2
              4 months ago

              I invite you to re-read the second paragraph of my post.

              You’re just throwing things I already listed back at me. I mentioned a staging environment, I mentioned a schedule was a (bad) option.

              • Snot Flickerman@lemmy.blahaj.zone
                link
                fedilink
                English
                arrow-up
                3
                arrow-down
                2
                ·
                edit-2
                4 months ago

                An obvious option is to set some machines to update on Monday and the others to update on Wednesday, but that only gives me only weekly updates…

                You can literally schedule them by the minute, but okay buddy.

                I’ll never not be stumped by people who are looking for answers shitting all over those answers.

                • remram@lemmy.mlOP
                  link
                  fedilink
                  arrow-up
                  4
                  ·
                  4 months ago

                  Maybe I’m not being clear.

                  I want to stagger updates, giving time to make sure they work before they hit the whole fleet.

                  If a new SSH version comes out on Tuesday, I want it installed to 1/3 of the machines on Tuesday, another third on Wednesday, and the rest in Friday. Or similar.

                  Having machines update on a schedule means I have much less frequent updates and doesn’t even guarantee that they hit the staging environment first (what if they’re released just before the prod update time?)