7 Update Existing Installation
Hadi Nategh edited this page 2018-05-22 10:12:57 +02:00

WikiInstallationUpdate Existing Installation

Update An Existing Installation

Despite which distribution you have your EGroupware instance installed on, it's always good idea to run update frequently in order to get the latest update patches and security fixes.

IMPORTANT: Before persuing update procedures we highly recommend you to make a backup from your EGroupware instance.Here is backup procedure.

Please select the distribution from the below list and follow its update instruction.

Ubuntu/Debian CentOS/RedHat openSUSE/SLEs

Ubuntu/Debian

Manual Update

1- apt update
You may run command apt list --upgradable in order to see list of packages which will be upgraded.
2- apt upgrade

Automatic Update

1- apt install unattended-upgrades
after installing unattended-upgrades you need to add egroupware packages into list of allowed packages in 50unattended-upgrades file.
2-vi /etc/apt/apt.conf.d/50unattended-upgrades

EGroupware Ubuntu Debian
EPL find the Unattended-Upgrade::Allowed-Origins and add the following line:
"*stylite-epl*:";
find the Unattended-Upgrade::Origins-Pattern and add the following line:
"o=obs://build.opensuse.org/stylite-epl/Debian_8.0,a=";
CE find the Unattended-Upgrade::Allowed-Origins and add the following line:
"*eGroupWare*:";
find the Unattended-Upgrade::Origins-Pattern and add the following line:
"o=obs://build.opensuse.org/server:/eGroupWare/Debian_8.0,a=";

(You need to replace the Debian version according to your used version / repository.)

3- check if the unattended-upgrades with configure packages:
unattended-upgrades --dry-run --debug
--dry-run: only downloads the upgradable packages but will not install them unless you run the unattended-upgrades command with no parameter.
If you wish to check logs and see what has happened with packages, you may read the following logs:

/var/lib/unattended-upgrades/unattended-upgrades.log
/var/lib/unattended-upgrades/unattended-upgrades-shutdown.log
/var/lib/unattended-upgrades/unattended-upgrades-dpkg.log

4- unattended-upgrades will be scheduled for automatic updates and will run automatically, so, from now on you don't need to be worry about out-dated packages.


CentOS/RedHat

Manual update

yum update

Automatic update

1- yum install yum-updatesd
2- vi /etc/yum/yum-updatesd.conf
change variable do_update=no to do_update=yes
3- service yum-updatesd restart

Alternative: here is details info abour yum-cron


openSUSE/SLEs

Manual update

zypper update

Automatic update

Enter Yast; there is a menu item called online update configuration where you can configure your system update behavior.