--
© 2014 Google Inc. 1600 Amphitheatre Parkway, Mountain View, CA 94043
Email preferences: You received this email because you signed up for the Google Compute Engine Discussion Google Group (gce-dis...@googlegroups.com) to participate in discussions with other members of the Google Compute Engine community and the Google Compute Engine Team.
---
You received this message because you are subscribed to the Google Groups "gce-discussion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to gce-discussio...@googlegroups.com.
To post to this group, send email to gce-dis...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/gce-discussion/122f8e71-b901-476b-abe4-268d0d4f0a15%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
To post to this group, send email to gce-di...@googlegroups.com.
To post to this group, send email to gce-dis...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/gce-discussion/863AE9167659164895FB36D83CC97F351300BFC6%40SW-FRAADS-MBX38.ads.dlh.de.
Thank you for your feedback Evan.Based on your information, are any/all the following true?1. By default/automatically, Google Compute Engine instances, in this case a CentOS version of the OS, will update any/all packages daily. Users do not control this, nor do they need to manually keep up with updates and patches as they do when using an Amazon EC2 instance.NOTE: This is not pertaining to new instances created. This question pertains to instances that are live, running, and had been spun up in the distant past.
2. The repository chosen by Google is comprehensive and covers installed modules and additional services such as openSSL. Thus, we can be assured that any/all recent openSSL updates are/were updated automatically upon or near their release.
3. There is no need to add or update the repository referenced for updates and no need to manually update anything on a Google Compute Engine instance - running.
Thanks again for your expertise and attention to this question.Regards,
Caveat: I don't actually build/manage the GCE images, so these represent my best understanding; if you need more details, I can try to dig up the current ground truth.
If you're concerned that these properties of the image may change, it should be safe (idempotent) to re-apply the automatic updates configuration.On Mon Jun 16 2014 at 10:25:37 AM, Gr...@VitalElement.com <gr...@vitalelement.com> wrote:Thank you for your feedback Evan.Based on your information, are any/all the following true?1. By default/automatically, Google Compute Engine instances, in this case a CentOS version of the OS, will update any/all packages daily. Users do not control this, nor do they need to manually keep up with updates and patches as they do when using an Amazon EC2 instance.NOTE: This is not pertaining to new instances created. This question pertains to instances that are live, running, and had been spun up in the distant past.The images created by Google for GCE have automatic updates enabled, where possible. These rely on the mechanisms provided by the distributions (CentOS, in this case), and may be disabled by user if desired. (i.e. you can remove or modify the 'yum-cron' configuration to not update certain packages if you want.)
Note that this might not include rebooting for kernel updates, depending on the distro. (I don't know what the current status of this is.)
2. The repository chosen by Google is comprehensive and covers installed modules and additional services such as openSSL. Thus, we can be assured that any/all recent openSSL updates are/were updated automatically upon or near their release.Google uses or mirrors the official distribution repositories, including (for example) the debian-security repos. In the case of the recent OpenSSL issues, I believe that these should have been automatically updated within 24 hours once available. (I think the automatic updates run once a day; again, this is without doing much research.)
3. There is no need to add or update the repository referenced for updates and no need to manually update anything on a Google Compute Engine instance - running.Assuming you're happy with the upstream CentOS/Debian/SuSE/RedHat repositories and don't need to install other software or point to other repos, then you should be covered. All four distros do a pretty good job of keeping up to date and patching security problems as they are announced, and you should be able to find more info about security patches for all of them in the CVE database: http://cve.mitre.org/
Thanks again for your expertise and attention to this question.Regards,
On Mon, Jun 16, 2014 at 1:01 PM, Evan Anderson <arg...@google.com> wrote:
The GCE default images have nightly automatic updates enabled via the 'yum-cron' package.See this Centos forum post for more details on the process: https://www.centos.org/forums/viewtopic.php?t=4296
wolfram.schlickenrieder@swiss.com
SWISS.COM
Email preferences: You received this email because you signed up for the Google Compute Engine Discussion Google Group (gce-discussion@googlegroups.com) to participate in discussions with other members of the Google Compute Engine community and the Google Compute Engine Team.
---
You received this message because you are subscribed to the Google Groups "gce-discussion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to gce-discussion+unsubscribe@googlegroups.com.
To post to this group, send email to gce-discussion@googlegroups.com.
Hi Greg,
Answers inline below.
On Jun 17, 2014 5:16 AM, "Gr...@VitalElement.com" <gr...@vitalelement.com> wrote:
> 1. On any given GCE, CentOS/Apache and module updates and patches are automatically applied daily by default via yum-cron -- unless disabled by root user.
This is currently true for our CentOS images as well as our Red Hat Enterprise Linux images, yes.
> 2. Based on the automatic daily server updates from the yum-cron, any time a root ssh command of yum install updates or yum update is run, su will always get at "No package updates available" and "No packages marked for Update" respectively. This is due to the fact that the updates were already done by the instance within 24 hours of any given attempt.
That outcome will only occur if no updates have been made available since the last time packages have been updated. While the daily updates means this will commonly be the case, updates might be available if they were released within the last day or if the instance has not yet run its first daily round of package updates.
> 3. Restarting Apache (httpd) should be all that is needed to load any new updates/patches, NOT at total machine/server reboot. Correct?
This is true for updates to Apache. However, any component of the system might be updated and need to be restarted, such as the OpenSSH server or the kernel. In the case of a kernel update, a total machine/server reboot is necessary to activate the new kernel. This is true in most Linux environments, not just Google Compute Engine.
> We are moving from Amazon EC2 to Google's Compute Engine and need to be sure our 'policies and procedures' for our new server admin are clear and accurate. Your assistance and feedback is truly appreciated.
I hope this helps!
- Jimmy
Greg Johnson
Vital Element, Inc.