[debian-edu-commits] [Debian Wiki] Update of "DebianEdu/Documentation/Wheezy/Maintenance" by LukeCall

Debian Wiki debian-www at lists.debian.org
Mon Feb 3 18:24:15 UTC 2014


Dear Wiki user,

You have subscribed to a wiki page or wiki category on "Debian Wiki" for change notification.

The "DebianEdu/Documentation/Wheezy/Maintenance" page has been changed by LukeCall:
https://wiki.debian.org/DebianEdu/Documentation/Wheezy/Maintenance?action=diff&rev1=6&rev2=7

  
  Using {{{aptitude}}} is really simply. To update a system you need to execute two commands on the command line as root: {{{aptitude update}}} (which updates the lists of available packages) and {{{aptitude upgrade}}} (which upgrades the packages for which an upgrade is available).
  
- It is also a good idea to install {{{cron-apt}}} and {{{apt-listchanges}}} and configure them to send mail to an address you are reading. 
+ It is also a good idea to install {{{cron-apt}}} and {{{apt-listchanges}}} and configure them to send mail to an address you are reading.
  
  {{{cron-apt}}} will notify you once a day via email about any packages that can be upgraded. It does not install these upgrades, but does download them (usually in the night), so you don't have to wait for the download when you do {{{aptitude upgrade}}}.
  ## what does it do that you can't get more easily these days with "APT::Periodic::..." lines in an /etc/apt/apt.conf.d file?
  
- Automatic installation of updates can be done easily if desired, it just needs the {{{unattended-upgrades}}} package to be installed.
+ Automatic installation of updates can be done easily if desired, it just needs the UnattendedUpgrades package to be installed.
  
  {{{apt-listchanges}}} can send new changelog entries to you via email, or alternativly display them in the terminal when running {{{aptitude}}} or {{{apt-get}}}.
  
  === Keep yourself informed about security updates ===
  
- Running {{{cron-apt}}} as described above is a good way to learn when security updates are available for installed packages. 
+ Running {{{cron-apt}}} as described above is a good way to learn when security updates are available for installed packages.
  Another way to stay informed about security updates is to subscribe to the [[http://lists.debian.org/debian-security-announce/|Debian security-announce mailinglist]], which has the benefit of also telling you what the security update is about. The downside (compared to {{{cron-apt}}}) is that it also includes information about updates for packages which aren't installed.
  
  == Backup Management ==
  For backup management point your browser to https://www/slbackup-php. Please note that you need to access this site via SSL, since you have to enter the root password there. If you try to access this site without using SSL it will fail.
  
- By default tjener will back up {{{/skole/tjener/home0}}}, {{{/etc/}}}, {{{/root/.svk}}} and LDAP to /skole/backup which is under the LVM. If you only want to have spare copies of things (in case you delete them) this setup should be fine for you. 
+ By default tjener will back up {{{/skole/tjener/home0}}}, {{{/etc/}}}, {{{/root/.svk}}} and LDAP to /skole/backup which is under the LVM. If you only want to have spare copies of things (in case you delete them) this setup should be fine for you.
  
  /!\ Be aware that this backup scheme doesn't protect you from failing hard drives.
  
@@ -34, +34 @@

  
  If you want to restore a complete folder, your best option is to use the command-line:
  
- {{{ 
+ {{{
  $ sudo rdiff-backup -r <date>  \
     /skole/backup/tjener/skole/tjener/home0/user \
     /skole/tjener/home0/user_<date>
@@ -91, +91 @@

  
  New package are available for upgrades.  The critical ones are normally security fixes.  To upgrade, run 'apt-get upgrade && apt-get dist-upgrade' as root in a terminal or log in via ssh to do the same.  On thin client servers, remember to also update the LTSP chroot using {{{ltsp-chroot apt-get update && ltsp-chroot apt-get upgrade}}}.
  
- If you do not want to manually upgrade packages and trust Debian to do a good job with new versions, you can install the {{{unattended-upgrades}}} package and configure it to automatically upgrade all new packages every night.  This will not upgrade the LTSP chroots.
+ If you do not want to manually upgrade packages and trust Debian to do a good job with new versions, you can install the UnattendedUpgrades package and configure it to automatically upgrade all new packages every night.  This will not upgrade the LTSP chroots.
  
  To upgrade the LTSP chroot, one can use {{{ltsp-chroot apt-get update && ltsp-chroot apt-get upgrade}}}.  On 64-bit servers, one will have to add {{{-a i386}}} as an argument to ltsp-chroot.  It is a good idea to update the chroot when updating the host system.
  



More information about the debian-edu-commits mailing list