SUSE® Linux Enterprise (SLE) allows to update an existing system to the new version, for example, going from SLE 11 SP3 to SLE 12. No new installation is needed. Existing data, such as home and data directories and system configuration, is kept intact. You can update from a local CD or DVD drive or from a central network installation source.
If you are familiar with SUSE Linux Enterprise updates, upgrades and service packs in general, you can check the terminology section for news and then dive right into the update overview section. This shows the available update possibilities and guides you in planning the overall update, and the subsequent sections: step-by-step update instructions to the current release, SUSE Linux Enterprise Desktop 12.
The rest of the chapter gives background information on the SUSE product lifecycles and Service Pack releases, recommended upgrade policies, how SUSE Linux Enterprise software is current despite non-current version numbers ("backports"), and further material referenced by the step-by-step update instructions.
This chapter uses several terms. In order to understand the information, read the definitions below:
Backporting is the act of adapting specific changes from a newer version of software and applying it to an older version. The most commonly used case is fixing security holes in older software components. Usually it is also part of a maintenance model to supply enhancements or (less commonly) new features.
A delta RPM consists only of the binary diff between two defined versions of a package, and therefore has the smallest download size. Before being installed, the full RPM package is rebuilt on the local machine.
A metaphor of how software is developed in the open source world (compare it with upstream). The term downstream refers to people or organizations like SUSE who integrate the source code from upstream with other software to build a distribution which is then used by end users. Thus, the software flows downstream from its developers via the integrators to the end users.
Extensions (also known as add-on products) provide additional functionality of product value to SUSE Linux Enterprise Desktop. They are provided by SUSE and by SUSE partners, and they are registered and installed on top of the base product SUSE Linux Enterprise Desktop.
Modules are fully supported parts of SUSE Linux Enterprise Desktop with a different life cycle. They have a clearly defined scope and are delivered via online channel only. Registering at the SUSE Customer Center is a prerequisite for being able to subscribe to these channels.
Updating to a Service Pack (SP) by using the online update tools (rather than the installation media) to install the respective patches. It updates all packages of the installed system to the latest state—including updates—of SP3 plus SP2 updates.
A package is a compressed file in rpm format that
contains all files for a particular program, including optional
components like configuration, examples, and documentation.
A patch consists of one or more packages and may be applied by means of delta RPMs. It may also introduce dependencies to packages that are not installed yet.
The Major Release of SUSE Linux Enterprise (or any software product) is a new version which brings new features and tools, decomissions previously deprecated components and comes with backwards incompatible changes.
Combines several patches into a form which is easy to install or deploy. Service packs are numbered and usually contain security fixes, updates, upgrades, or enhancements of programs.
A metaphor of how software is developed in the open source world (compare it with downstream). The term upstream refers to the original project, author or maintainer of a software that is distributed as source code. Feedback, patches, feature enhancements, or other improvements flow from end users or contributors to upstream developers. They decide if the request will be integrated or rejected.
If the project members decide to integrate the request, it will show up in newer versions of the software. An accepted request will benefit all parties involved.
If a request is not accepted, it may be for different reasons. Either it is in a state which is not compliant with the project's guidelines, it is invalid, it is already integrated, or it is not in the interest or roadmap of the project. An unaccepted request makes it harder for upstream developers as they need to synchronize their patches with the upstream code. This practice is generally avoided, but sometimes it is still needed.
Installation of a newer minor version of a package.
Installation of a newer major version of a package or distribution, which brings new features.
SUSE Linux Enterprise supports direct upgrades from one release to the next. For example, if you currently run SUSE Linux Enterprise 11 SP2, you will upgrade in two steps, first to SUSE Linux Enterprise 11 SP3 and then to SUSE Linux Enterprise 12.
It is not possible to skip an intermediate release when updating. For that reson, when you are running several versions back, like SUSE Linux Enterprise 10 or SUSE Linux Enterprise 11 SP1, SUSE recommends to consider a fresh install instead of a long sequence of upgrades.
Cross-architecture upgrades, such as upgrading from a 32-bit version of SUSE Linux Enterprise Desktop to the 64-bit version, or upgrading from big endian to little endian are not supported!
Specifically, SLE 11 SP3 on POWER (big endian) to SLE 12 on POWER (new: little endian!), is not supported.
Also, as SUSE Linux Enterprise 12 is 64bit only, upgrades from any 32bit SUSE Linux Enterprise 11 systems to SUSE Linux Enterprise 12 are not supported.
There is no supported direct migration path to SUSE Linux Enterprise 12. A fresh install is recommended instead.
There is no supported direct migration path to SUSE Linux Enterprise 12.
If you can not do a fresh install, you need to first update from SUSE Linux Enterprise 11 GA to SP1, and then from SUSE Linux Enterprise 11 SP1 to SP2, before you can proceede. These first steps are described online in the SUSE Linux Enterprise 11 Deployment Guide (https://www.suse.com/documentation/sles11/).
Then you proceed with the next step:
First you upgrade the system to SUSE Linux Enterprise 11 SP3. Refer to Section 4.4, “Intermediate step: Updating SLE 11 SP2 to SLE 11 SP3” for details.
Then proceed with the next step:
Refer to Section 4.5, “Upgrading to SLE 12” for details.
Before starting the update procedure, make sure your system is properly prepared. Among others, preparation involves backing up data and checking the release notes.
In the release notes you can find additional information on what has changed since the previous release of SUSE Linux Enterprise. Please verify there if your specific hardware or set up needs special considerations, which of your favourite specific software packages have changed significantly, and which precautions you should take in addition to the general recommendations of this section. The Release Notes also provide last minute information and known issues, that couldn't make it to the manual on time.
The current version of the release notes document containing the latest information on SUSE Linux Enterprise Desktop can be read online at http://www.suse.com/doc/sles12/#start.
Before updating, copy existing configuration files to a separate medium
(such as tape device, removable hard disk, etc.) to back up the data.
This primarily applies to files stored in /etc as
well as some of the directories and files in /var
and /opt. You may also want to write the user data
in /home (the HOME directories) to a
backup medium. Back up this data as root. Only root has read
permissions for all local files.
If you have selected as the
installation mode in YaST, you can choose to do a (system) backup at a
later point in time. You can choose to include all modified files and
files from the /etc/sysconfig directory. However,
this is not a complete backup, as all the other important directories
mentioned above are missing. Find the backup in the
/var/adm/backup directory.
Before starting your update, make note of the root partition. The
command df / lists the device name of the root
partition. For example, in Example 4.1, “List with df -h”, the root
partition to write down is /dev/sda3 (mounted as
/).
df -h #Filesystem Size Used Avail Use% Mounted on /dev/sda3 74G 22G 53G 29% / tmpfs 506M 0 506M 0% /dev/shm /dev/sda5 116G 5.8G 111G 5% /home /dev/sda1 39G 1.6G 37G 4% /windows/C /dev/sda2 4.6G 2.6G 2.1G 57% /windows/D
Software tends to “grow” from version to version.
Therefore, take a look at the available partition space with
df before updating. If you suspect you are running
short of disk space, secure your data before updating and repartitioning
your system. There is no general rule regarding how much space each
partition should have. Space requirements depend on your particular
partitioning profile and the software selected.
If your machine serves as a VM Host Server for KVM or Xen, make sure to properly shut down all running VM Guests prior to the update. Otherwise you may not be able to access the guests after the update.
Online Migration is supported by the following tools:
(graphical user interface)
zypper (command line)
If updating your system via online migration, the update is carried out while the system is running. You only need to reboot once, after the update is completed. It is still possible to update with the following alternatives:
In order to do an online update, the following requirements must be met. Make sure to also read Section 4.3, “General Preparations for Updating”.
In order to be able to connect to the update repositories, your
product has to be registered. If this is not the case, either run the
module in YaST or the
suse_register command line tool to start the
registration.
Make sure the currently installed version has the latest patches installed. Run an Online Update prior to the Online Migration. When using a graphical interface, start the YaST Online Update or the updater applet. On the command line, run the following commands (the last command needs to be run twice):
zypper ref -s zypper update -t patch zypper update -t patch
Reboot the system if needed.
See Chapter 1, YaST Online Update, Administration Guide or Section “Updating Software with Zypper”, Chapter 7, Managing Software with Command Line Tools, Administration Guide for more information on the online update tools.
If your setup involves third-party software or add-on software, test this procedure on another machine to make sure that the dependencies are not broken by the update.
The online migration always has to be completed from beginning to end. If an online migration is interrupted in between, the system will be corrupted beyond recovery.
When all requirements are met (see
Section 4.4.4.1, “Requirements”),
the update applet in the tray will display a message that a
distribution upgrade is available. Click it to start YaST
. Alternatively run
/usr/sbin/wagon as root from the command
line.
Confirm the dialog with .
If finds that the requirements are not met (required maintenance updates are available but not yet installed) it will do an automatic self-update which may require a reboot. Follow the on-screen instructions.
Choose the update method in the following dialog. Choose to use the default setup (recommended).
Click to manually choose the software
repositories used for the online migration. A list of repositories
will be displayed, providing the opportunity to manually enable,
disable, add, or delete repositories. Add the SP3 update source(s).
This can either be the SP3 installation media or the
SP3-Pool and SP3-Updates
repositories. Click to return to the
dialog.
If you want to review changes to the repository setup caused by the update process, select .
Proceed with .
The system will be re-registered. During this process the
SP3-Pool and SP3-Updates
repositories will be added to the system (see
Section 4.7.2, “Repository Model” for more
information). Confirm the addition of the repositories.
If you have selected in the dialog, the list of repositories will be displayed, providing the opportunity to manually enable, disable, add, or delete repositories. Proceed with when finished.
The screen opens presenting a summary of the update configuration. The following sections are available:
You may add SUSE Linux Enterprise Server add-on products or third-party products here.
Lists the actions that will be performed during the update. You can choose whether to download all packages before installing them (default, recommended), or whether to download and install packages one by one.
Statistical overview of the update.
Set backup options.
Click and to proceed.
It is safe to abort the online migration on this screen prior to clicking and on all previous screens. Click to leave the update procedure and restore the system to the state it was in prior to starting YaST Wagon. Follow the instructions on screen and perform a re-registration before leaving Wagon to remove the SP2 repositories from your system.
During the update procedure the following steps are executed:
Packages will be updated.
The system will be rebooted (press ).
The newly updated system will be re-registered.
Your system has been successfully updated to Service Pack 3.
zypper #
When all requirements are met (see
Section 4.4.4.1, “Requirements”),
the “products” needed for the online migration are added
to /etc/products.d. Get a list of these products
by running the following command:
zypper se -t product | grep -h -- "-migration" | cut -d'|' -f2
This command should at least return
SUSE_SLED-SP3-migration.
Depending on the scope of your installation, more products may be
listed.
Install the migration products retrieved in the previous step with the
command zypper in -t product
LIST_OF_PRODUCTS, for example
zypper in -t product SUSE_SLED-SP3-migration
Register the products installed in the previous step in order to get the respective update repositories:
suse_register -d 2 -L /root/.suse_register.log
Refresh the repositories and services:
zypper ref -s
Check the list of repositories you can retrieve with zypper
lr.
If any of these repositories is not enabled (the
SP3 ones are not enabled by default when following
this workflow), enable them with zypper modifyrepo --enable
REPOSITORY ALIAS, for example:
zypper modifyrepo --enable SLED11-SP3-Core SLED11-SP3-Updates
If your setup contains third-party repositories that may not be
compatible with SP3, disable them with zypper modifyrepo
--disable REPOSITORY ALIAS.
Now everything is in place to perform the distribution upgrade with
zypper dup --from REPO 1 --from
REPO 2
.... Make sure to list all needed
repositories with --from, for example:
zypper dup --from SLED11-SP3-Pool --from SLED11-SP3-Updates
Confirm with to start the upgrade.
Upon completion of the distribution upgrade from the previous step, run the following command:
zypper update -t patch
Now that the upgrade to SP3 has been completed, you need to re-register your product:
suse_register -d 2 -L /root/.suse_register.log
Lastly, reboot your system.
Your system has been successfully updated to Service Pack 3.
Updating your system via online migration is done from within the running system. You only need to reboot once, after the update is completed.
In order to do an online update, the following requirements must be met. Make sure to also read Section 4.3, “General Preparations for Updating”.
In order to be able to connect to the update repositories, your
product needs to be registered. If this is not the case, either run
the module in YaST or the
suse_register command line tool to start the
registration.
Make sure the currently installed version has the latest patches installed. Run an Online Update prior to the Online Migration. When using a graphical interface, start the YaST Online Update or the updater applet. On the command line, run the following commands (the last command needs to be run twice):
zypper ref -s zypper update -t patch zypper update -t patch
Reboot the system if needed.
See Chapter 1, YaST Online Update, Administration Guide or at Section “Updating Software with Zypper”, Chapter 7, Managing Software with Command Line Tools, Administration Guide. for more information. on the online update tools.
If your setup involves third-party software or add-on software, test this procedure on another machine to make sure that the dependencies are not broken by the update.
The online migration always needs to be completed from beginning to end. If an online migration is interrupted in between, the system is corrupted beyond recovery.
The online migration with YaST Wagon is only available prior to SUSE Linux Enterprise Server 12.
When all requirements are met (see
Section 4.4.4.1, “Requirements”),
the update applet in the tray will display a message that a
distribution upgrade is available. Click it to start YaST
. Alternatively run
/usr/sbin/wagon as root from the command
line.
Confirm the dialog with .
If finds that the requirements are not met (required maintenance updates are available but not yet installed) it will do an automatic self-update, which may require a reboot. Follow the on-screen instructions.
Choose the update method in the following dialog. Choose to use the default setup (recommended).
Click to manually choose the software
repositories used for the online migration. A list of repositories
will be displayed, providing the opportunity to manually enable,
disable, add, or delete repositories. Add the SP2 update source(s).
This can either be the SP2 installation media or the
SP2-Core and SP2-Updates
repositories. Click to return to the
dialog.
If you want to review changes to the repository setup caused by the update process, select .
Proceed with .
The system will be re-registered. During this process the
SP2-Core and SP2-Updates
repositories will be added to the system (see
Section 4.7.2, “Repository Model” for more
information). Confirm the addition of the repositories.
If you have selected in the dialog, the list of repositories will be displayed, providing the opportunity to manually enable, disable, add, or delete repositories. Proceed with when finished.
Choose the migration type:
Updates all packages to the latest SP2 level.
Updates a minimal set of packages to the latest SP2 level.
Click to manually select the repositories used for upgrading.
Confirm your selection.
The screen opens, presenting a summary of the update configuration. The following sections are available:
You may add SUSE Linux Enterprise Server add-on products or third-party products here.
Lists the actions that will be performed during the update. You can choose whether to download all packages before installing them (default, recommended), or whether to download and install packages one by one.
Statistical overview of the update.
Set backup options.
Click and to proceed.
It is safe to abort the online migration on this screen prior to clicking and on all previous screens. Click to leave the update procedure and restore the system to the state it was in prior to starting YaST wagon. Follow the instructions on screen and perform a re-registration before leaving Wagon to remove the SP2 repositories from your system.
During the update procedure the following steps are executed:
Packages will be updated.
The system will be rebooted (press ).
The newly updated system will be re-registered.
Your system has been successfully updated to Service Pack 2.
zypper #
When all requirements are met (see
Section 4.4.4.1, “Requirements”),
the “products” needed for the online migration have been
added to /etc/products.d. Get a list of these
products by running the following command:
zypper se -t product | grep -h -- "-migration" | cut -d'|' -f2
This command should at least return
SUSE_SLED-SP2-migration.
Depending on the scope of your installation, more products may be
listed.
Install the migration products retrieved on the previous step with
the command zypper in -t product
LIST_OF_PRODUCTS, for example
zypper in -t product SUSE_SLED-SP2-migration
Register the products installed in the previous step in order to get the respective update repositories:
suse_register -d 2 -L /root/.suse_register.log'
Refresh repositories and services again:
zypper ref -s
Check the list of repositories you can retrieve with zypper
lr. At least the following
repositories need to be :
SLED11-SP1-Pool
SLED11-SP1-Updates
SLED11-SP2-Core
SLED11-SP2-Updates
Depending on the scope of your installation, further repositories for add-on products or extensions need to be enabled.
If one of these repositories is not enabled (the
SP2 ones are not enabled by default when following
this workflow), enable them with zypper modifyrepo --enable
REPOSITORY ALIAS, for example:
zypper modifyrepo --enable SLED11-SP2-Core SLED11-SP2-Updates
If your setup contains third-party repositories that may not be
compatible with SP2, disable them with zypper modifyrepo
--disable REPOSITORY ALIAS.
Now everything is in place to perform the distribution upgrade with
zypper dup --from REPO 1 --from
REPO 2
.... Make sure to list all
needed repositories with --from, for example:
zypper dup --from SLED11-SP2-Core --from SLED11-SP2-Updates
Confirm with to start the upgrade.
Upon completion of the distribution upgrade from the previous step, a Minimal Migration has been performed (a minimal set of packages has been updated to the latest SP2 level). Skip this step if you do not intend to do a Full Migration.
In order to do a Full Migration (updates all packages to the latest SP2 level), run the following command:
zypper update -t patch
Now that the upgrade to SP2 has been completed, you need to re-register your product:
suse_register -d 2 -L /root/.suse_register.log
Last, reboot your system.
Your system has been successfully updated to Service Pack 2.
As an alternative to the Online Migration (see Section 4.4.4, “Online Migration” for details) you may also update your system by booting from an installation source—either a DVD or a network installation source. The update will start like a normal installation.
Service Pack 2 ISO images can be obtained from http://download.suse.com/. Either burn it to a DVD or prepare a network installation source as described in Section 11.2, “Setting Up the Server Holding the Installation Sources”.
Before starting a new installation of a SUSE Linux Enterprise SP, ensure that all the Service Pack installation media (DVDs) are available.
Insert the first SUSE Linux Enterprise SP medium and boot your machine. A boot screen similar to the original installation of SUSE Linux Enterprise 11 is displayed.
Select and continue as outlined in the YaST installation instructions in Chapter 3, Installation with YaST.
Before starting an update of a SUSE Linux Enterprise SP from a network installation source, make sure that the following requirements are met:
A network installation source is set up according to Section 11.2, “Setting Up the Server Holding the Installation Sources”.
A working network connection on both the installation server and the target machine that includes a name service, DHCP (optional, but needed for PXE boot), and OpenSLP (optional) exists.
The SUSE Linux Enterprise SP DVD 1 to boot the target system or a target system set up for PXE boot according to Section 11.3.5, “Preparing the Target System for PXE Boot” exist.
Refer to Chapter 11, Remote Installation for in-depth information on starting the upgrade from a remote server.
To perform a network installation using the SP DVD as the boot medium, proceed as follows:
Insert the SUSE Linux Enterprise SP DVD 1 and boot your machine. A boot screen similar to the original installation of SUSE Linux Enterprise 11 is displayed.
Select to boot the SP Kernel then use F4 to select the type of network installation source (FTP, HTTP, NFS, or SMB).
Provide the appropriate path information or select as the installation source.
Select the appropriate installation server from those offered or use the boot options prompt to provide the type of installation source and its actual location as in Installing from a Network Server. YaST starts.
Finish the installation as outlined in Section 4.4.5.3, “The Update Procedure”.
To perform a network installation of a SUSE Linux Enterprise Service Pack via network, proceed as follows:
Adjust the setup of your DHCP server to provide the address information needed for PXE boot according to Section 11.3.5, “Preparing the Target System for PXE Boot”.
Set up a TFTP server to hold the boot image needed for PXE boot.
Use the first CD or DVD of your SUSE Linux Enterprise Service Pack for this or follow the instructions in Section 11.3.2, “Setting Up a TFTP Server”.
Prepare PXE boot and Wake-on-LAN on the target machine.
Initiate the boot of the target system and use VNC to remotely connect to the installation routine running on this machine. See Section 11.5.1, “VNC Installation” for more information.
Finish the installation as outlined in Section 4.4.5.3, “The Update Procedure”.
Once you have successfully booted from installation medium or the network, proceed as follows to start the update:
On the screen choose and and Accept the license agreement. Proceed with .
In case you have booted from a physical medium, perform a to verify the integrity of the medium. Only skip this step if you have checked the medium before.
On the screen, choose . Clicking will start the update procedure.
As an alternative to downloading the updates for each single client system from the SUSE update server, it is possible to use the Subscription Management Tool (SMT) for SUSE Linux Enterprise to mirror the updates to a local server.
This tool acts as SUSE Customer Center proxy both for client registrations and as software update repository. The SMT documentation at http://www.suse.com/doc/smt11/ gives an overview of its features as well as instructions on how to implement it.
SUSE Manager is a server solution for providing updates, patches, and security fixes for SUSE Linux Enterprise clients. It comes with a set of tools and a Web-based user interface for management tasks.
The SUSE Manager documentation at http://www.suse.com/doc/suse_manager/ gives an overview of its features as well as instructions on how to set up server and clients.
Upgrading from SUSE Linux Enterprise 11 SP3 (or higher) to SUSE Linux Enterprise 12 is supported by the following tools:
Manual upgrade, booting from an ISO (see Section 4.5.1, “Manual upgrade from SUSE Linux Enterprise 11 SP3 or higher, using an installation source”
Semi-automated migration, possible via ssh
You may upgrade your system by booting from an installation source—either a local DVD or a network installation source, just as if you'd perform a fresh install. You then just select "Upgrade" instead of "Install" in the Boot Screen to upgrade the system.
Select a boot method to start the system from the ISO (see Section 3.1, “Choosing the Installation Method”).
Start up the system from the ISO (see Section 3.2, “System Start-up for Installation”).
On the Boot Screen, select "Upgrade" to start the system upgrade.
If you select "Install", data may be lost later. You need to be extra carefull to not destroy your data partitions during a fresh install, e.g. by repartitioning the disks (which can destroy the existing partitions) or by reformatting the data partitions (which erases all data on them). SUSE recommends to select "Upgrade" here.
Perform the usual upgrade process (see Section 4.4.5.3, “The Update Procedure”).
To perform an automated migration, proceed as follows:
Copy the installation Kernel linux and the file
initrd from
/boot/x86_64/loader/ of your first installation
DVD to your system's /boot directory:
cp-vi DVDROOT/boot/x86_64/loader/linux /boot/linux.upgradecp-vi DVDROOT/boot/x86_64/loader/initrd /boot/initrd.upgrade
DVDROOT denotes the path where your system
mounts the DVD, usually
/run/media/$USER/$DVDNAME.
Open the GRUB legacy configuration file
/boot/grub/menu.lst and add another section. For
other boot loaders, edit the respective configuration file(s). Adjust
device names accordingly. For example:
title Linux Upgrade Kernel kernel (hd0,0)/boot/linux.upgrade root=/dev/sda1 upgrade OPTIONAL_PARAMETERS initrd (hd0,0)/boot/initrd.upgrade
OPTIONAL_PARAMETERS denote additional boot parameters which you might need to boot your system and perform the upgrade. These may be kernel paramters needed for your system --- you may need to review and copy those from an existing GRUB entry. They also may be SUSE linuxrc paramters, documented online (http://en.opensuse.org/Linuxrc).
If the upgrade should be done automated , add the
autoupgrade=1 at the end of the
kernel line in your GRUB configuration.
Reboot your machine and select the newly added section from the boot
menu (here: Linux Upgrade Kernel). You can use
grubonce to preselect the newly created grub entry
for an unattended automatic reboot into the newly created entry. You
can also use reboot to initiate the reboot from the
command line.
Perform the usual upgrade process (see Section 4.4.5.3, “The Update Procedure”).
After the upgrade process was finished successfully, remove the
installation Kernel and initrd files
(/boot/linux.upgrade and
/boot/initrd.upgrade). They are useless now and
are not needed anymore.
The Atomic Update is based on tools that manage two copies of the system and allow easy recovery after an update failure. The delivered tools require a special disk partition setup. Every copy of the system resides on a primary partition of its own. If an update fails, you can always switch back to the previous state of the system, which is available on the other partition.
The implementation has strict requirements on disk partitioning: the
first root partition is /dev/sda1 and must not
occupy more than half of the entire disk size. Then the tools will
create /dev/sda2 for the system's second root
partition. Further partitions if available are shared on both root
partitions—take their size into account, and reduce the size of
the first partition accordingly; this is a rough calculation:
The size of the complete disk minus size of
sda1 minus sda2 is the
free space of additional partitions.
Install the system with /dev/sda1 as the single
root partition and with less than half of the entire disk size.
Customize the installed system as needed. Make sure to have the
multi-update-tools package installed.
Run multi-update-setup --partition, which creates
the system's second root partition (/dev/sda2) of
the similar size.
Partition the rest of the disk as needed and continue with customizations(*).
Run multi-update-setup --clone to copy the system to
the other partition. With this command you also change the
/ (root) entry in /etc/fstab
of the target system.
If needed, do further customizations(*).
Run multi-update-setup --bootloader to initialize
the boot loader setup. The boot loader menu will then contain an entry
to boot the other system.
Installation of the GRUB 2 boot loader is mandatory. The tools are not compatible with other boot loaders.
If there are no customizations to be done as marked with (*), run
multi-update-setup --complete which performs all the
three steps.
Run multi-update. This command runs
zypper in a chroot
environment and updates the other system— it does not matter which
one is active. Its boot menu will be offered as the default at boot time.
If the updated system has a damaged boot loader after the update, you must change the “Active” flag and set it for the root partition of the other system in order to boot it.
If the updated system does not boot at all, you need access to the boot loader menu to select the other system.
For more information about GRUB 2, see Chapter 13, The Boot Loader GRUB 2, Administration Guide.
The root partition must be mounted by partition name, by ID, or in another way. Mounting by partition UUID or by label is not supported.
For more information, see
/usr/share/doc/packages/multi-update-tools/README
coming with the multi-update-tools package.
SUSE Linux Enterprise Server has a 13-year life-cycle: 10 years of general support and 3 years of extended support.
SUSE Linux Enterprise Desktop has a 10-year life-cycle: 7 years of general support and 3 years of extended support.
Major releases are made every 4 years. Service packs are made every 18 months.
SUSE supports previous service packs for 6 months after the release of the new service pack. Figure 4.1, “Major Releases and Service Packs” depicts some of the mentioned aspects.
If you need additional time to design, validate and test your upgrade plans, Long Term Service Pack Support can extend the support you get an additional 12 to 36 months in twelve month increments, giving you a total of 3 to 5 years of support on any given service pack (see Figure 4.2, “Long Term Service Pack Support”).
The range for extended support levels starts from year 10 and ends in year 13. These contain continued L3 engineering level diagnosis and reactive critical bug fixes. These support levels proactively update trivial local root exploits in Kernel or other root exploits directly executable without user interaction. Furthermore they support existing workloads, software stacks, and hardware with limited package exclusion list. Find an overview in Table 4.1, “Security Updates and Bug Fixes”.
|
General Support for Most Recent Service Pack (SP) |
General Support for Previous SP, with LTSS |
Extended Support with LTSS | |||
|---|---|---|---|---|---|
|
Feature |
Year 1-5 |
Year 6-7 |
Year 8-10 |
Year 4-10 |
Year 10-13 |
|
Technical Services |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Access to Patches and Fixes |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Access to Documentation and Knowledge Base |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Support for Existing Stacks and Workloads |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Support for New Deployments |
Yes |
Yes |
Limited (Based on partner and customer requests) |
Limited (Based on partner and customer requests) |
No |
|
Enhancement Requests |
Yes |
Limited (Based on partner and customer requests) |
Limited (Based on partner and customer requests) |
No |
No |
|
Hardware Enablement and Optimization |
Yes |
Limited (Based on partner and customer requests) |
Limited (Based on partner and customer requests) |
No |
No |
|
Driver updates via SUSE SolidDriver Program (formerly PLDP) |
Yes |
Yes |
Limited (Based on partner and customer requests) |
Limited (Based on partner and customer requests) |
No |
|
Backport of Fixes from recent SP |
Yes |
Yes |
Limited (Based on partner and customer requests) |
N/A |
N/A |
|
Critical Security Updates |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Defect Resolution |
Yes |
Yes |
Limited (Severity Level 1 and 2 defects only) |
Limited (Severity Level 1 and 2 defects only) |
Limited (Severity Level 1 and 2 defects only) |
The repository layout corresponds to the product lifecycles. Table 4.2, “Repository Layout for SUSE Linux Enterprise 11 SP2 and SP3 and for SUSE Linux Enterprise 12” contains a list of all repositories from SUSE Linux Enterprise 11 SP2 to SUSE Linux Enterprise 12.
|
Type |
SLES |
SLED | ||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Required Repositories |
11 SP2
11 SP3
12
|
11 SP2
11 SP3
12
| ||||||||||||||||||||
|
Optional Repositories |
11 SP2
11 SP3
12
|
11 SP2
11 SP3
12
| ||||||||||||||||||||
|
NEW: Module Specific Repositories |
12
|
12 |
Maintenance updates to packages in the corresponding
Core or Pool repository.
Containing all binary RPMs from the installation media, plus pattern information and support status metadata.
These repositories contain static content. Of these two, only the
Debuginfo-Updates repository receives updates.
Enable these repositories if you need to install libraries with debug
information in case of an issue.
SUSE Linux Enterprise 11 SP3.
With the update to SP3 there are only two repositories available:
SLED11-SP3-Pool
and
SLED11-SP3-Updates.
Any previous repositories from SP2 are visible, but not enabled. These
disabled repositories are only needed for users who have particular
needs.
SUSE Linux Enterprise 12.
With the update to SUSE Linux Enterprise 12 there are only two repositories available:
SLED12-GA-Pool
and
SLED12-GA-Updates.
Any previous repositories from SUSE Linux Enterprise 11 SP3 are disabled.
On registration, the system receives repositories from the SUSE Customer Center. The
repository names map to specific URIs in the customer center (see
https://scc.suse.com/). To list all available repositories on your
system, use zypper as follows:
zypper repos -u
This gives you a list of all available repositories on your system.
Each repository is listed by its alias, name and whether it is enabled
and will be refreshed. The option -u gives you also
the URI from where it originated.
If you want to remove old repositories (for example, from SP1), use
zypper removerepo and the names of the repositories.
For example, to remove the old SP1 and SP2 repositories, use the
following command:
zypper removerepo SLES11-SP1-Pool SLES11-SP1-Updates \
SLE11-SP1-Debuginfo-Pool SLE11-SP1-Debuginfo-Updates \
SLES11-SP2-Core SLES11-SP2-Updates \
SLE11-SP2-Debuginfo-Core SLES11-SP2-Extension-Store\
SLE11-SP2-Debuginfo-UpdatesIf you want to re-add some of your repositories, log in to https://scc.suse.com/ and select from the menu › . There you can see a list of URIs; Only repositories from this list of products can be added. For example, to add the SP2 Extension Store, use the following command (one line, without the backslash):
zypper addrepo -n SLES11-SP2-Extension-Store \
https://nu.novell.com/repo/\$RCE/SLES11-SP2-Extension-Store/nu_novell_com:SLES11-SP2-Extension-StoreSUSE extensively uses backports, i.e. the migration of current software fixes and features into released SUSE Linux Enterprise packages. The information in this section helps you understand why it can be deceptive to compare version numbers in order to judge the capabilities and the security of SUSE Linux Enterprise software packages. You'll understand how SUSE keeps the system software secure and current while maintaining compatibility for your application software on top of SUSE Linux Enterprise products. You'll also learn how to check which public security issues actually are addressed in your SUSE Linux Enterprise system software, and how current your software really is.
Upstream developers are primarily concerned with advancing the software they develop. In many cases they combine fixing bugs with introducing new features which have not yet received extensive testing and which may introduce new bugs.
For distribution developers, it is important to distinguish between:
bugfixes with a limited potential for disrupting functionality; and
changes that may disrupt existing functionality.
In most cases, distribution developers do not follow all upstream changes once a package has become part of a released distribution. Usually they stick instead with the upstream version that they initially released and create patches based on upstream changes to fix bugs. This practice is known as backporting.
Distribution developers generally will only introduce a newer version of software in two cases:
when the changes between their packages and the upstream versions have become so large that backporting is no longer feasible, or
for software that inherently ages badly, like anti-malware software.
SUSE uses backports extensively as we strike a good balance between a number of concerns for enterprise software. The most important of these are:
Having stable interfaces (APIs) that software vendors can rely on when building products for use on SUSE's enterprise products.
Ensuring that packages used in the release of SUSE's enterprise products are of the highest quality and have been thoroughly tested, both in themselves and as part of the whole enterprise product.
Maintaining the various certifications of SUSE's enterprise products by other vendors, like certifications for Oracle or SAP products.
Allowing SUSE's developers to focus on making the next version of the product as good as they can make it, rather than them having to spread their focus thinly across a wide range of releases.
Keeping a clear view of what is in a particular enterprise release, so that our support can provide accurate and timely information about it.
It is a general policy rule that no new upstream versions of a package are introduced into our enterprise products. This rule is not an absolute rule however. For a limited class of packages, in particular anti-virus software, security concerns weigh heavier than the conservative approach that is preferable from the perspective of quality assurance. For packages in that class, occasionally newer versions are introduced into a released version of an enterprise product line.
Sometimes also for other types of packages the choice is made to introduce a new version rather than a backport. This is done when producing a backport is not economically feasible or when there is a very relevant technical reason to introduce the newer version.
Because of the practice of backporting, one cannot simply compare version numbers to determine whether a SUSE package contains a fix for a particular issue or has had a particular feature added to it. With backporting, the upstream part of a SUSE package's version number merely indicates what upstream version the SUSE package is based on. It may contain bug fixes and features that are not in the corresponding upstream release, but that have been backported into the SUSE package.
One particular area where this limited value of version numbers when backporting is involved can cause problems is with security scanning tools. Some security vulnerability scanning tools (or particular tests in such tools) operate solely on version information. These tools/tests are thus prone to generating “false positives” (claims that a vulnerable piece of software has been found which in fact is not vulnerable) when backports are involved. When evaluating reports from security scanning tools, one should always investigate whether an entry is based on a version number or on an actual test of whether an actual vulnerability exists.
There are a number of locations where information regarding backported bug fixes and features is stored:
The package's changelog:
rpm -q --changelog name-of-installed-package rpm -qp --changelog packagefile.rpm
The output briefly documents the change history of the package.
The package changelog may contain entries like
bnc#1234 that refer to bugs in Novell's Bugzilla
tracking system or links to other bugtracking systems. (Because of
confidentiality policies, not all such information may be accessible
to you).
A package may contain a
/usr/share/doc/packagename/README.SUSE
or README.SuSE file which contains general,
high-level information specific to the SUSE package.
The RPM source package contains the patches that were applied during the building of the regular binary RPMs as separate files that can be interpreted if you are familiar with reading source code. See Section “Installing or Downloading Source Packages”, Chapter 7, Managing Software with Command Line Tools, Administration Guide for installing sources of SUSE Linux Enterprise software, see Section “Installing and Compiling Source Packages”, Chapter 7, Managing Software with Command Line Tools, Administration Guide for building packages on SUSE Linux Enterprise and see the Maximum RPM (http://www.rpm.org/max-rpm/) book for the inner workings of SUSE Linux Enterprise software package builds.
For security bug fixes, the
SUSE
security announcements (http://www.suse.com/support/security/#1). These often refer to bugs through
standardized names like CAN-2005-2495 which are
maintained by the Common
Vulnerabilities and Exposures (http://cve.mitre.org) project.
Migration hooks allow you to run a custom external script at some point during the migration process. These scripts allow you to handle specific problems that cannot be handled via the usual RPM scripts, or allow you to perform any extra actions that might be needed during migration (not required during normal package update).
The migration hooks are executed with root privileges so it is possible to do any maintenance tasks in the scripts (starting/stopping services, data backup, data migration, etc...). The scripts must not be interactive; STDIN and STDOUT are redirected to pipes when running in YaST. The X session should not be used, as it might not be available in all cases (for example, when running in text mode). Do not forget to set the executable permission for the hook scripts.
Migration hooks are supported in
yast2-wagon package
version 2.17.32.1 (provided as an update for SLES11-SP2) or 2.17.34
(included in SLES11-SP3) or higher versions.
The scripts are searched in
/var/lib/YaST2/wagon/hooks/ directory. The expected
script name is in the format
step_seq_prefix_name, where:
is a predefined migration step name, describing the current migration step.
is a sequence number in range 00...99, which makes it possible to set the order in which the scripts are executed. (It is important to keep the zeros at the beginning to enable correct sorting!)
should be unique to avoid conflicts (like a namespace). Use package name (if it is part of a package) or your vendor name, Internet domain name, etc., anything that can be considered sufficiently unique
can be any string (used to differentiate the scripts). Some descriptive name is recommended.
/var/lib/YaST2/wagon/hooks/before_package_migration_00_postgresql_backup
The script should return exit value 0. If it fails (any non-zero exit value) an error message is displayed in Wagon and it is possible to restart the script, ignore the failure (and continue with other scripts) or completely cancel the hooks for the current step and stage.
The hook scripts can be potentially run more times (when going back and forth in the Wagon dialogs, Wagon might restart itself or some steps might be executed multiple times in the migration workflow), so the scripts have to cope with that fact (they can check at the beginning whether they need to do the action or the action has been already done or they can create a simple temporary stamp file or otherwise solve multiple runs properly).
Some hooks are optional (because the depend on the previous results or depend on user selected values). Note that some hooks are called multiple times (for example, registration is called before migration and after migration). Here is the list of supported hooks (step names) in execution order:
before_init
started at the very beginning (note: it is called again after Wagon restarts)
before_welcome
, after_welcome
started before/after displaying the welcome dialog
before_registration_check
, after_registration_check
Wagon checks the registration status (if registration of some products has expired the migration might fail). If everything is OK, no dialog is displayed and Wagon automatically continues with the next step
before_custom_url
, after_custom_url
repository manager is started (optional, in Patch CD mode only)
before_self_update
, after_self_update
called before/after Wagon updates itself (to ensure the latest version is used for migration)
before_installing_migration_products
, after_installing_migration_products
called before/after installing the migration products
before_selecting_migration_source
, after_selecting_migration_source
Wagon asks the user to migrate via SUSE Customer Center repositories or using a custom repository; the next step depends on the user selection
before_registration
, after_registration
running SUSE register (to add migration repositories)
before_repo_selection
, after_repo_selection
manual repository management
before_set_migration_repo
, after_set_migration_repo
selecting migration repositories (full/minimal migration when using SUSE Customer Center) or update repository selection (custom repository migration)
before_package_migration
before package update starts, after this step the real migration starts and it is not possible to go back to the previous state automatically (aborting in this phase results in an inconsistent (half upgraded) system, and manual rollback is needed)
before_registration
, after_registration
running SUSE register (to register updated products)
before_congratulate
, after_congratulate
before/after Wagon displays the congratulation dialog as a result of a successful migration
before_exit
called just before Wagon exits (always, regardless the migration result, also after abort and at restart)
These are special abort hooks which are called when the user aborts the migration. These hooks can be called in any step in the migration workflow therefore the execution order cannot be guaranteed. The scripts need to check the current state if they rely on the results of other hooks.
before_abort
user confirmed aborting the migration
before_abort_rollback
, after_abort_rollback
user confirmed rollback after abort (reverting to the old products installed before starting migration). These hooks are called after before_abort and skipped when the user does not confirm rollback.
These hooks are called whenever Wagon restarts itself.
before_restart
Wagon is finishing and will be started again
after_restart
Wagon has restarted and runs the next step in the migration workflow
The list of hooks is fairly large, but many of them only make sense in special cases. In normal use cases these should be given preference:
To do some action before the system is migrated (still running the
previous version) use the before_package_migration
hook.
At this point it is clear that the migration is ready and is about to start, whereas in all steps before it was possible to abort the migration.
To do some action after the system has migrated (the system is running
the new migrated version, but some things might not be active yet, for
example, updated kernel requires reboot, updated services might need
restart etc..), use before_congratulate or
after_congratulate hook.
This can be also used for cleaning up the temporary results of the
before_package_migration hook. At this point the
migration has successfully finished.
To reverse the changes if the migration is aborted, use one of the abort hooks depending on the case. Keep in mind that the abort hooks can be called anytime, so the revert might not be needed (the hook that does the changes might not have been called yet). The abort hooks need to check the current state.
Older versions of Wagon supported only two hook scripts:
/usr/lib/YaST2/bin/wagon_hook_init and
/usr/lib/YaST2/bin/wagon_hook_finish. The problem
was that only one script could be run as a hook and it was not possible
to put hooks directly into RPM packages.
These old hook scripts are still supported in newer versions of Wagon
for backward compatibility, but the new hooks
before_init and before_exit should
be used instead of the obsolete ones.