We upgraded to 8.1.2 and want to use workload manager, workload manager requires systemd. With 8.1.x you can allow the splunk user to stop/start the systemd splunk service, which works fine however it seems to be to broad of a configuration and also allows for stopping/starting other systemd services as well. Is there a way to lock down the polkit rule where it doesn't grant beyond the splunk service? I'll do more research on polkit to see if I can find a way but wondering if others have done this.
sh-4.2$ sudo /apps/splunk/bin/splunk enable boot-start -systemd-managed 1 -create-polkit-rules 1 -user splunk
CAUTION: The system has systemd version < 237 and polkit version > 105. With this combination, polkit rule created for this user will enable this user to manage all systemd services.Are you sure you want to continue [y/n]? y
Systemd unit file installed at /etc/systemd/system/Splunkd.service.
Polkit rules file installed at /etc/polkit-1/rules.d/10-Splunkd.rules.
Configured as systemd managed service.
If systemd version is greater than 236 and polkit version is greater than 0.105 then user has access to only Splunk service managed by systemd else it gives access to all the services managed by systemd.
I checked my phone app and it is the latest app version 237. I thought it had something to do with being logged in to a family account to share apps so I removed the primary account and factory reset the headset with only my account. Still no update available and stuck on version 57.
I turned off auto update to see if this was the issue and same result, still on version 57 without ability to update
On the one hand, you're right, I admit that.
On the other hand.....I know, that these updates are rolled out in waves and it always takes this time to reach all users.
So why get upset about it?
Non devs sometimes have a very narrow view of development, there's a reason why these updates don't get deployed globally to all devices, among them bugs, testing, so what do you rather, fast and buggy releases, or less fast but better ones?
Hey @tootall.394001! Just wanted to hop in here and provide my insight. As @Choleni and @Razalghuul mentioned; when it comes to release versions, they will always roll out in waves and take time to get to everyone. This way our team can make sure they check for bugs throughout the release and try to snip them in the bud before becoming widespread.
Having trouble with a Facebook or Instagram account? The best place to go for help with those accounts is the Facebook Help Center or the Instagram Help Center. This community can't help with those accounts.
A widespread outage was caused on Azure instances earlier today, when systemd 237-3ubuntu10.54 was published to the bionic-security pocket. Instances could no longer resolve DNS queries, breaking networking.
The trigger was found to be open-vm-tools issuing "udevadm trigger". Azure has a specific netplan setup that uses the `driver` match to set up networking. If a udevadm trigger is executed, the KV pair that contains this info is lost. Next time netplan is executed, the server loses it's DNS information.
If a regression were to occur, it would affect systemd-udevd processing 'change' events from network devices, which could lead to network outages. Since this would happen when systemd-networkd is restarted on postinstall, a regression would cause widespread outages due to this SRU being targeted to the security pocket, where unattended-upgrades will automatically install from.
Starting at approximately 06:00 UTC on 30 Aug 2022, a number of customers running Ubuntu 18.04 (bionic) VMs recently upgraded to systemd version 237-3ubuntu10.54 reported experiencing DNS errors when trying to access their resources. Reports of this issue are confined to this single Ubuntu version.
Do note this is not a solution for those using non-Azure resolvers provided via DHCP through their VNET. These users must reboot or manually set the fallback servers to their custom DNS resolver addresses
Not sure if this is the best place to help people out understanding if nodes are impacted.
We already saw 2 different types of impact on our Azure AKS clusters.
- Pod not able to Terminate
- New images being pulled from ACR (or any container registry
Hey guys, nothing is working. My application has been out since this early morning. We have already tried to restart the nodes, restart the VM, but nothing has been working and we don't have any update from Microsoft. 4 hours ago they said "More information will be provided within 60 minutes, when we expect to know more about the root cause and mitigation workstreams.".
We are testing this in our AKS clusters now, but we were able to manually scale up a node pool which brought up new "working" nodes. Then manually scaled the pool back down to remove the "non-working" nodes. This left only new nodes up and the services are functioning properly now.
Could this be a related issue, when deployment to aks fails, due to a connection refused when pulling images from azure container registry(ImagePullBackOff). This problem started this morning out of the blue.
Credentials for azure container service are ok and about every 20 image pulls I get one, and the container would start.
I you look closer at the message accompanying the ImagePullBackOff, you should see something like:
dial tcp: lookup registry-1.docker.io on [::1]:53: read udp [::1]:36288->[::1]:53: read: connection refused
To temporary mitigate the ImagePullBackOff I scaled up a new functional node (DNS wise) and used this command to reconcile the AKS cluster:
az resource update --resource-group --name --namespace Microsoft.ContainerService --resource-type ManagedClusters
az vm availability-set list -g --query "[].virtualMachines[].id" --output tsv az vm run-command invoke --scripts "echo FallbackDNS=168.63.129.16 >> /etc/systemd/resolved.conf; systemctl restart systemd-resolved.service" --command-id RunShellScript --ids @-
You can find here some simple Python script to run a command to the VMSS instances for all subscriptions [or filtered ones]: -command-on-all-vmss
I still lack threading, so this might take a little bit.
@mruffel thank you for the debdiff! With my limited systemd codebase knowledge, this change feels fine. But I agree with the regression potential section of the SRU description - we should make sure that the update is well tested before going out as potentially it can change behavior.
The test package has been looking good throughout our internal testing, and we have proceeded to build the next systemd update, version 237-3ubuntu10.55, and it is currently in the bionic-security -proposed ppa.
if you do test, comment here on how it went. Again, please don't put the package into production until it has had a little more testing, and we will get this released to the world as quickly and safely as we can.
@mruffell, spinning up a clean Azure 18.04 Bionic VM and following your steps + reproducer, I can confirm DNS and network connectivity work fine after installing systemd from the security proposed ppa:
Thank to Microsoft for fixing the issue on all AKS clusters.
But for the history we fixed that by just cordoning and then draining all cordoned nodes.
It effectively gracefully rotates the node pools.
Attached is the second patch required to fully fix this bug. It adds a check on preinstall to see if ID_NET_DRIVER is present on the network interface, and if it is missing, call udevadm trigger -c add on the interface to add it.
Attached is an improvement on the previous patch revision. Output is now forwarded to logger, we use shell expansion to enumerate network devices, we omit loopback, and we added a udevadm settle to wait for any thunderstorms to resolve before we continue installing the new udev package.
Inadmissible at the Time of Entry or Adjustment of Status or Violates Status [see article]
General Crimes [see article]
Security and Related Grounds [see article]
Public Charge [see article]
Unlawful Voters [see article]
It is important for aliens to comply with all applicable registration requirements, including notifying the DHS of changes of address. In addition to the deportability provision in section 237(a)(3)(A), an alien who willfully fails to register or who fails to notify of change of address may be subject to criminal penalties under section 266 of the INA.
Any alien or any parent or legal guardian of any alien, who files an application for registration containing statements known by him to be false, or who procures or attempts to procure registration of himself or another person through fraud, shall be guilty of a misdemeanor and shall, upon conviction thereof, be fined not to exceed $1,000, or be imprisoned not more than six months, or both; and any alien so convicted shall, upon the warrant of the Attorney General, be taken into custody and be removed in the manner provided in part IV of this subchapter.
The documents constituting an application for registration are found in 8 C.F.R. 264.1. You may read the version current as of January 29, 2018, here: [PDF version]. Essentially, section 266 of the INA criminalizes procuring or attempting to procure registration (as defined in 8 C.F.R. 264.1) for oneself or another through fraud. In addition to the stipulated fine and potential imprisonment, an alien thus convicted would be subject to removal from the United States. Like section 237(a)(3)(A), section 237(a)(3)(B)(i) is not a particularly common deportability ground. However, it is important to note that it is one of many INA provisions targeted at fraud, including the seemingly ubiquitous section 212(a)(2)(C)(i) (inadmissibility for fraud or willful misrepresentation of a material fact to procure any benefit(s) under the immigration laws), which do not require criminal convictions to trigger removability.
Second, section 237(a)(3)(B)(ii) of the INA renders deportable an alien who has at any time been convicted of a violation of, or an attempt or a conspiracy to violate, any provision of the Foreign Agents Registration Act of 1938 (22 U.S.C. 611 et seq.). For your convenience, we have uploaded a Department of Justice (DOJ) guide on the Foreign Agents Registration Act (FARA), which includes the text of 22 U.S.C. 611 [PDF version]. Failure to register as a foreign agent is unlikely to be a pertinent issue for the vast majority of immigrants and nonimmigrants in the United States. However, any alien who may be working for or on behalf of a foreign government should always ensure that he or she complies with the strict registration requirements in FARA, which have both criminal and civil (immigration removal) applications and repercussions.
7fc3f7cf58