[Info-vax] How do I make zip, unzip etc. available to all users?
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Fri Jan 8 10:21:15 EST 2016
On 2016-01-08 08:35:27 +0000, Hans Vlems said:
> I'm just a hobbyist so my requirements are not as strict as a shop that
> serves a 24x7 production line.
> Applying a VMS patch on 11 Alphas was however a RPITA. Would I've
> wanted a vendor pushed/forced update like Microsoft, Mozilla etc do? I
> don't think so. I prefer to know what gets fixed and if it is something
> that bothers me.
For more than a few folks, the reticence is around the perceived
quality of the patches. Or the lack thereof. If the patches install
and work, they're more easily accepted. If the patches break things,
then it's a circling-the-drain sort of mess, where even working patches
get deferred and delayed, where server security weakens, where system
integrity suffers, and where bug-related support calls increase
including the sorts of callers that expect proof, and... well....
badness ensues. This mess was also a factor in the genesis of the
roll-up patches — running full regressions for all of the permutations
of a dozen disparate point fix patch kits is time-consuming and
expensive.
> Installing patches or layered products for 11 systems ought to be
> easier than manually repeating the same procedure.
> All systems are basically configured the same. I am working on one
> system that stores the kit and one batch job that does all the work.
For another platform, I run a central patch server.
That server downloads and caches patches from the vendor, and — if you
want or need to manage that flow — stage which patches are available
for deployment, and which are held pending. This at the patch server.
Individual systems then query that server either on a schedule or
manually, and then download and install the patches, and — prompting
for permission — require at most one reboot to complete the
installation. Internally, this might actually be several reboots in a
row, but control — unlike OpenVMS — is not returned to the user between
any sequenced reboots that might be necessary.
These individual systems can then either be configured for automatic
installation, or manually triggered.
For the end-user or the system or environment manager or the DevOps
team, this amounts to pressing a button or issuing a single command,
and all of the staged patches are downloaded from the vendor or from
the local patch server, installed, configured and launched.
For those environments where this approach is insufficient or
inappropriate, an environment akin to an installation via host-based
InfoServer is available; selecting and installing new disk images, or
pushing disk images.
If site-specific prepared disk images are inappropriate, then there's a
web-based system that allows either pushing out specific software
packages to specific systems, or allowing the end-users of the systems
to select and install centrally-provided, licensed and managed software
packages — self-service installations.
All of this is available now. All of this works. If folks do not
currently have this for some particular platform — I don't know the
Windows patch process and distribution mechanisms, for instance — then
they likely will soon have these capabilities. These are the sort of
basic system operations and tools that tend to spread — not necessarily
the same tools, but the same ideas and capabilities — that spread
across all platforms, and that become expected.
>From the patch processing and associated contract and verification
data, VSI also gets information on active OpenVMS systems and on
down-revision systems, can get opt-in data on server configurations,
and other benefits, too. Probably opt-in crash data, too. If a patch
gets installed and applications and/or servers suddenly start crashing,
maybe there's a bug that got past QA and the patch should be put on
hold? Better integration and quicker feedback, rather than the
engineering team not knowing (at all), having to wait for support calls
to be logged, and then sending out email messages to... somebody. Or
if there are crashes that are fixed by some existing patch, prompting
for a particular patch, whether via the patch process and/or email.
Given it's opt-in and given crash scanning can be partially automated,
accepting crash reports from even off-contract and hobbyist sites is a
way to up-sell support, and — if there are a boatload of crashes — a
way to identify problems that can or will effect supported sites, too.
Post up a sane price and an HTTPS order form — web browsers can be
embedded, and can be text-based — and you might sell a few, too.
What the OpenVMS system management folks have to go through to get
InfoServer and/or patches and/or patch downloads and the rest is
utterly absurd. Computers are good at automating processes, even with
the desire or the need that some sites have for manually pulling an
installation "trigger".
Now some of you will rightfully harrumph over these features and claim
"we've always done it this way" or "this works", well, good on you.
Glad things are working out. But ponder this... New users are not
going to want to learn and deal with this. More than a few just aren't
going to patch or to upgrade, too. Yes, "we walked uphill to school.
Both ways. In the snow." Etc. Have fun expanding the installed base
with that. Yeah, "not my problem". But if new users and new
applications don't arrive at least as fast as the existing applications
and environments retire or migrate off of OpenVMS, then OpenVMS is
dead. The more barriers are in the way of adoption and operations, the
less likely anybody outside of a legacy shop will choose OpenVMS.
The article on changing the IP address of an OpenVMS server is doing a
brisk business. Which should tell you some things about user
interfaces and changes in expectations.
But then this is rather advanced and probably way past aspirational for
the folks at VSI, given their work schedule, staffing, and the utterly
stellar state of the existing OpenVMS patch management tools.
> VMS systems operate in different environments and one solution won't
> do. That is where a system manager still earns his keep. The same
> applies to Windows servers, many are not blindly upgraded as soon
> Microsoft issues a patch.
Which gets back to the trade-off between the fear of new and previously
unknown bugs and the occasional known bugs, and the perceived risks of
the existing and known bugs. More than a few customers clearly don't
trust Microsoft to be able to completely manage the complexity of their
hardware and software environment. (That Microsoft does as well as
they do with the massive permutations they deal with is no small
achievement, too.)
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list