Also, given the "boot environments" and live upgrade methods of OI and other Solaris derivatives, applying a patch is NOT dangerous.

Apply, reboot into new environment (overnite??), and if things seem to have problems, go back to the old environment. The only caution that seems reasonable is to not apply too many patches or updates at once: in the outlandish case of a patch problem, you want to be able to guess with some accuracy which part of the patches applied had the problem. Doing the proper snapshots of non-BE datasets is of course required before rebooting into a "test" environment.


On 2013-04-07 13:47, Edward Ned Harvey (openindiana) wrote:
From: Ben Taylor [mailto:bentaylor.sol...@gmail.com]

Patching is a bit of arcane art.  Some environments don't have
test/acceptance/pre-prod with similar hardware and configurations, so
minimizing impact is understandable, which means patching only what is
necessary.
This thread has long since become pointless and fizzled, but just for the fun 
of it:

I recently started a new job, where updates had not been applied to any of the 
production servers in several years.  (By decree of former CIO).  We recently 
ran into an obstacle where some huge critical deliverable was not possible 
without applying the updates.  So we were forced, the whole IT team working 
overnight on the weekend, to apply several years' backlog of patches to all the 
critical servers worldwide.  Guess how many patch-related issues were 
discovered.  (Hint:  none.)

Patching is extremely safe.  But let's look at the flip side.  Suppose you 
encounter the rare situation where patching *does* cause a problem.  It's been 
known to happen; heck, it's been known to happen *by* *me*.  You have to ask 
yourself, which is the larger risk?  Applying the patches, or not applying the 
patches?

First thing to point out:  Suppose you patch something and it goes wrong ...  
Generally speaking you can back out of the patch.  Suppose you don't apply the 
patch, and you get a virus or hacked, or some data corruption.  Generally 
speaking, that is not reversible.

For the approx twice in my life that I've seen OS patches cause problems, and 
then had to reverse out the patches...  I've seen dozens of times that somebody 
inadvertently sets a virus loose on the internal network, or a server's memory 
or storage became corrupted due to misbehaving processes or subsystem, or some 
server has some kind of instability and needs periodic rebooting, or becomes 
incompatible with the current release of some critical software or hardware, 
until you apply the patches.

Patches are "bug fixes" and "security fixes" for known flaws in the software.  You can't say 
"if it ain't broke, don't fix it."  It is broke, that's why they gave you the fix for it.  At best, you can 
say, "I've been ignoring it, and we haven't noticed any problems yet."


_______________________________________________
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


_______________________________________________
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss

Reply via email to