Anyone else with experience or opinions on this topic?

I know there are advice out there to always pin everything, i.e. A), to have a 
truly immutable deploy, but then you probably need to be very actively 
monitoring new releases, perhaps run "docker scan" to know when to upgrade etc.

So far I have been doing C) i.e. pinning minor version, but without the 
frequent pulling to look for updates.
Is there a way to tell Kubernetes to auto poll for updated images in the 
background?

Jan

> 4. feb. 2022 kl. 15:06 skrev Jan Høydahl <jan....@cominvent.com>:
> 
> Indeed, helm/solr-operator makes it very smooth to do those upgrades.
> A thing worth noting is that if you have pinned, say 9.0, then you will
> get 9.0.1, 9.0.2 etc, but once 9.1 is released, there will not be new Solr
> bugfix releases for 9.0.x. So if you choose that route, you need to monitor
> new releases[1] or new security announcements[2] closely in order to upgrade
> manually.
> 
> [1] https://solr.apache.org/feeds/solr/news.atom.xml
> [2] https://solr.apache.org/feeds/solr/security.atom.xml
> 
> Jan
> 
>> 4. feb. 2022 kl. 03:13 skrev Steve Davids <sdav...@gmail.com>:
>> 
>> Just as an FYI - it looks like the Solr Helm Chart
>> <https://artifacthub.io/packages/helm/apache-solr/solr#running-solr>
>> (Kubernetes installer) goes with A by default. Though, it does allow for
>> easy configurability to go with other options:
>> 
>> image.repository string "solr" The repository of the Solr image
>> image.tag string "8.9" The tag/version of Solr to run
>> image.pullPolicy string
>> PullPolicy for the Solr image, defaults to the empty Pod behavior
>> 
>> Those are the defaults, you can update the Image.pullPolicy to "Always"
>> <https://kubernetes.io/docs/concepts/containers/images/#image-pull-policy>
>> which will then mimic option C, but would require the containers to
>> "updated" in some capacity to trigger a re-pull/replace of that particular
>> container.
>> 
>> Having said all that, the joy of Helm templates is that you can easily
>> update the Image.tag version to perform a `helm upgrade` which will then
>> roll out the patched version you are trying to deploy out to your cluster.
>> Users should be diligent with regularly updating their clusters and luckily
>> Kubernetes/Helm makes that very easy to orchestrate
>> <https://apache.github.io/solr-operator/docs/solr-cloud/solr-cloud-crd.html#update-strategy>
>> .
>> 
>> -Steve
>> 
>> On 2022/02/03 14:40:40 Jan Høydahl wrote:
>>> Hi,
>>> 
>>> The project produces official Docker images for every release, including
>> our own bugfix releases.
>>> These images are based on an OpenJDK base image, which is again based on
>> a Linux base image.
>>> Once in a while, when there is a serious bugfix in either Linux or Java
>> the Solr image gets re-built by Docker.
>>> 
>>> I wanted to invite to a discussion on how you as users handle security
>> patching in your Docker/k8s production environments.
>>> 
>>> Do you:
>>> 
>>> A) just pull the image once and let it sit there until next upgrade?
>>> B) pin the exact version, e.g. solr:8.11.1 and pull routinely for Linux /
>> JDK updates?
>>> C) pin the minor version only, e.g. solr:8.1 and pull regularly for any
>> new patch releases
>>> D) pin the major oversion only, e.g. solr:8 and pull regularly for any
>> new minor releases
>>> E) make a custom Dockerfile FROM solr:8 and add "RUN apt upgrade" or
>> similar to stay up to date? How often?
>>> F) Neither of the above. Please share your best practice
>>> 
>>> This thread was triggered from
>> https://issues.apache.org/jira/browse/SOLR-15967, which is really about RPM
>> but strayed into security patching in general.
>>> 
>>> Thanks,
>>> Jan
> 

Reply via email to