Bookmark this page

Manage and Apply Errata to Hosts

Objectives

  • Inspect, filter, and apply Red Hat errata to content views for precise patch management.

Errata Management

After their initial release, Red Hat software packages might receive updates in the form of errata. Red Hat groups several packages into an erratum, with an advisory with a description of that erratum. The following types of advisories are provided, in descending order of importance:

Security advisory

Addresses security issues in software packages. The security impact of the issue is categorized as Low, Moderate, Important, or Critical.

Bug fix advisory

Provides fixes to bugs that were discovered in software packages.

Product enhancement advisory

Provides enhancements and new features to the package.

Content view errata filtering provides granular control over which updates are propagated to content views. The promotion of content views to lifecycle environments enables precise control over when and to which systems the updates are applied.

Note

A single erratum can address multiple issue types, such as a security issue and a product enhancement. Errata are categorized according to the most important advisory type that they contain. For example, product enhancement errata can contain only enhancement updates, whereas security errata can contain security and bug fixes, as well as product enhancements.

View Available Errata

In Red Hat Satellite, errata are further classified as either applicable or installable, to indicate their status in relation to specific content hosts.

Applicable errata updates packages that are installed in content hosts. Applicable errata are not ready for installation until the state changes to Installable.

Installable errata are available to a content host from a lifecycle environment, but are not yet installed. These errata can be installed by users who have permissions to manage content hosts, but are not entitled to errata management.

Navigate to ContentErrata to review the available errata. You can filter the list by repository and errata type (applicable or installable). Use a query string in parameter operator value form to limit the displayed errata. Refer to SectionTable 4.1, “Summary of Query Parameters for Filtering Errata” for a summary of the query parameters for filtering errata.

Table 4.1. Summary of Query Parameters for Filtering Errata

ParameterDescriptionExample
bugSearch by Bugzilla ID.bug = BZ#12345
cveSearch by CVE number.cve = CVE-2015-0101
idSearch by errata ID.id = RHBA-2015:2000
issuedSearch by errata issue date. Accepted values include exact date, "Feb 16, 2015", or keywords, "Yesterday" or "1 hour ago". Use the less-than (<) and greater-than (>) operators for time ranges.issued < "Jan 1, 2015"
packageSearch by the full package build name.package = glib2-2.22.5-6.el6.i686
package_nameSearch by the package name.package_name = glib2
severitySearch by severity level. This filter applies only to security errata.severity = Important
titleSearch by advisory title. The tilde character allows case-insensitive matches.title ~ apache
typeSearch by advisory type.type = bugfix
updatedSearch by last update date. Accepts the same search values as the issued parameter.updated = "2 days ago"

Configure the Host for Remote Execution

Use the remote execution feature to run jobs on hosts remotely from Capsules by using shell scripts, Ansible tasks, and Ansible Playbooks.

Applying errata requires configuring passwordless remote job execution. Enabling remote execution and distributing keys are discussed in a later chapter on remote execution.

When the Foreman proxy service's remote execution keys are available, install the public key on each host that you intend to target for remote execution.

Use the ssh-copy-id command to install the public key on the target host's root account.

[root@satellite ~]# ssh-copy-id \
-i ~foreman-proxy/.ssh/id_rsa_foreman_proxy.pub \
root@host
...output omitted...
root@host's password: password
...output omitted...

When the key is installed on the target host, attempt to log in to the target host by using the Foreman proxy private key. If you gain access without being prompted for a password, then the public key is properly installed and remote jobs can successfully access the target host.

[root@satellite ~]# ssh -i ~foreman-proxy/.ssh/id_rsa_foreman_proxy root@host
...output omitted...
[root@host ~]#

Apply Errata to Content Hosts

You can apply errata to a single host or to multiple hosts at the same time. Satellite Server can apply both installable errata and applicable errata. Although applicable errata are pertinent to content hosts, they are not available in the content host's content view and lifecycle environment.

In Satellite 6, administrators can apply applicable errata to content hosts by automatically creating a minor version of the affected content view to include the applicable errata. You can then promote this minor version to the appropriate lifecycle environment. Red Hat recommends to use the minor content view version method to apply errata.

Use the hammer host errata list --host host command to list errata to specific content hosts. You can filter the output by using the --search option.

[root@satellite ~]# hammer --output base host errata list \
--host host.example.com \
--search tzdata
Id:          918
Erratum ID:  RHBA-2022:1032
Type:        bugfix
Title:       tzdata bug fix and enhancement update
Installable: true

...output omitted...

Use the hammer job-invocation create command to apply errata to specific content hosts. You can identify the erratum to apply by using the erratum ID.

[root@satellite ~]# hammer job-invocation create \
--feature katello_errata_install \
--inputs errata=918 \
--search-query "name = host.example.com"
Job invocation 1 created
[.....................................................................] [100%]
1 task(s), 1 success, 0 fail

Emergency Errata Installation Method

Red Hat recommends the previous method for Red Hat Satellite implementations with a limited number of organizations and content hosts. Some Red Hat Satellite implementations might have several organizations with many content views and content hosts. For installing errata in this scenario, the standard method might take a long time to implement.

Some customers use the following method as a fast strategy to apply errata to several content hosts. Red Hat recommends that you open a proactive support ticket to discuss the errata installation strategy that best fits your environment. This method assumes that in the Red Hat Satellite implementation, Satellite Ansible Collections is installed and configured to perform the tasks.

  • Locate and save the record of the hosts' content view and lifecycle environment that meet the criteria for the errata installation.

  • Move the target hosts to the Default Organization content view and to the Library lifecycle environment.

  • On the target hosts, run the subscription-manager refresh and dnf clean all commands.

  • Install or update the errata packages on the target hosts.

  • Move the target hosts back to the corresponding content view and lifecycle environment.

If the packages from the errata are available in a repository that the host is not subscribed to, then you must subscribe to the required repositories and add the repositories to the corresponding content views.

References

For more information, refer to the Managing Errata chapter in the Red Hat Satellite 6.11 Managing Content Guide at https://access.redhat.com/documentation/en-us/red_hat_satellite/6.11/html-single/managing_content/index#Managing_Errata_content-management

For more information, refer to the Configuring and Setting up Remote Jobs chapter in the Red Hat Satellite 6.11 Managing Hosts at https://access.redhat.com/documentation/en-us/red_hat_satellite/6.11/html-single/managing_hosts/index#Configuring_and_Setting_Up_Remote_Jobs_managing-hosts

Revision: rh403-6.11-3ad886e