[ ... ]
> Then I should probably switch off automatic updates and work
> out a schedule for applying updates when I have checked what
> they include.
My impression is that OS *security* updates are pretty safe and
should be run automatically or at least frequently; other OS
updates almost always safe with EL5 and probably automatically
or frequently too; while middleware updates can be quite
dangerous and should be tested or researched in advance,
with the "leading edge" reporting.
The Torque/MAUI situation used to be (and probably still is)
somewhat edgy because authentication between the daemons is or
can be done via a "key", and I found that it is impossible to
reliably configure a key, so the builtin (compiletime) key must
be used, and the builtin key is potentially different on each
build of Torque/MAUI, so IIRC they must have been built together
(Torque MOMs on worker nodes are instead usually authorized by
IP address).
This seemed to be the case some time ago with the CERN/gLite
middleware, I don't know whether this is still the case with the
EMI versions (never mind the EPEL versions).
|