Tuesday Jan 08, 2013

How to Upgrade an Oracle Solaris 11 Repository with 11.1 Packages

These instructions assume you already have a local Oracle Solaris 11 11/11 IPS package repository, and you want to update that local repository by adding Oracle Solaris 11.1 packages.

You can either use the pkgrecv command or you can download a repository image file.

Using pkgrecv

Using pkgrecv takes more time and requires your system to be connected to the Internet for a much longer time. If you use pkgrecv, specify http://pkg.oracle.com/solaris/release as the source, and be sure to specify the -m all-versions option. See the pkgrecv(1) man page for more information.

Using a Repository Image File

If you prefer to use a repository image file, first download the image file and then copy the contents to your existing repository. You can get the Oracle Solaris 11.1 repository image files from OTN or from eDelivery. Then follow these instructions.

Step 0. Assume the root role and snapshot your local Oracle Solaris 11 11/11 repository.

In this example, your local Oracle Solaris 11 11/11 repository is located at /export/repo/Solaris11.

# zfs snapshot rpool/export/repo/Solaris11@11-1111

Step 1. Download Oracle Solaris 11 from OTN.

Go to the download page. Read the "OTN License Agreement for Oracle Solaris" and click the Accept License Agreement button.

Step 2. Click the "MD5 checksum" link to display the checksums for the files you want to download.

Step 3. Scroll down to "Oracle Solaris 11.1 Repository Image."

Step 4. Click "Download Part A SPARC, x86" to get the file sol-11_1-repo-full.iso-a.

Verify the checksum like this:

# digest -a md5 sol-11_1-repo-full.iso-a

Step 5. Click "Download Part B SPARC, x86" to get the file sol-11_1-repo-full.iso-b.

Verify the checksum.

# digest -a md5 sol-11_1-repo-full.iso-b

Step 6. Click "Download Oracle Solaris 11 Pre-Upgrade Repository Image SPARC, x86 to get the file sol-11_1-upgrade-repo.iso.

Verify the checksum.

# digest -a md5 sol-11_1-upgrade-repo.iso

Step 7. Create one image file from the Part A and Part B files.

Verify the checksum of the resulting image file.

# cat sol-11_1-repo-full.iso-a sol-11_1-repo-full.iso-b > sol-11_1-repo-full.iso

Step 8. Merge the Oracle Solaris 11.1 packages from the repository image file into your local Oracle Solaris 11 11/11 repository.

# mount -F hsfs sol-11_1-repo-full.iso /mnt
# rsync -aP /mnt/repo/ /export/repo/Solaris11
# umount /mnt

Step 9. Merge packages from the Oracle Solaris 11 pre-upgrade repository image into your local Oracle Solaris 11 11/11 repository.

# mount -F hsfs sol-11_1-upgrade-repo.iso /mnt
# rsync -aP /mnt/repo/ /export/repo/Solaris11
# umount /mnt

Step 10. Catalog new packages.

# pkgrepo refresh -s /export/repo/Solaris11
# pkg refresh solaris

You can use the pkgrepo info and pkgrepo get commands to check the properties set on the updated repository.

Step 11. Snapshot your updated repository.

# zfs snapshot rpool/export/repo/Solaris11@11.1

Step 12. Check that your Solaris publisher origin is set to your local repository.

- Alta Elstad

Website Newsletter Facebook Twitter

Thursday May 24, 2012

Overcoming Your Fear of Repositories

One of the best features of Oracle Solaris 11 is its software update model. As you have probably heard many times by now, the Image Packaging System (IPS) handles package dependencies automatically, so you no longer have to check them manually or create scripts that assemble the correct set of packages .

If you don't have a support contract, you have to wait until the next release of Oracle Solaris 11 to get the latest updates. But if you do have a support contract, you can keep your system updated with the latest security updates and bug fixes by downloading updates from the Oracle Support Repository. We recently published two articles that describe how, plus one more that shows you how to create multiple internal repositories.

How to Update Oracle Solaris 11 Systems from the Oracle Support Repository, by Glynn Foster

You may already know that you don't have to worry about manually tracking and validating patch dependencies when you update a version of Oracle Solaris 11. But did you also realize you can apply the updates to an alternate boot environment, and then schedule the switchover to happen automatically at a later time? Glynn Foster explains how, and how to make sure everything went well.

More Tips for Updating Oracle Solaris 11 Systems from the Oracle Support Repository, by Peter Dennis

The Oracle Support Repository contains bug fixes and critical security fixes that can be applied to existing Oracle Solaris 11 installations between major releases. The repository is updated monthly. Peter Dennis describes how to access those updates and apply them to your systems.

How to Create Multiple Internal Repositories for Oracle Solaris 11, by Albert White

Even though you may get all your software updates to Oracle Solaris 11 from an external repository, you may still want to create different internal repositories to serve different versions of Oracle Solaris 11 to different types of systems. Albert White shows you how to create and manage internal repositories for release, development, and support versions of Solaris 11.

There's plenty more where these came from. Be sure to bookmark our Installation Spotlight page, maintained by the kind and prolific folks who bring you Oracle Solaris 11.

About the picture ...
Laird Hamilton is a god.
Teahupoo is a killer wave.
Laird owned it.
Be like Laird.

- Rick

Website Newsletter Facebook Twitter

Friday Mar 23, 2012

How to subscribe to the free Oracle Linux errata yum repositories

Now that updates and errata for Oracle Linux are available for free (both as in beer and freedom), here's a quick HOWTO on how to subscribe your Oracle Linux system to the newly added yum repositories on our public yum server, assuming that you just installed Oracle Linux from scratch, e.g. by using the installation media (ISO images) available from the Oracle Software Delivery Cloud

You need to download the appropriate yum repository configuration file from the public yum server and install it in the yum repository directory. For Oracle Linux 6, the process would look as follows: as the root user, run the following command:

[root@oraclelinux62 ~]# wget http://public-yum.oracle.com/public-yum-ol6.repo \
-P /etc/yum.repos.d/
--2012-03-23 00:18:25--  http://public-yum.oracle.com/public-yum-ol6.repo
Resolving public-yum.oracle.com... 141.146.44.34
Connecting to public-yum.oracle.com|141.146.44.34|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 1461 (1.4K) [text/plain]
Saving to: “/etc/yum.repos.d/public-yum-ol6.repo”

100%[=================================================>] 1,461       --.-K/s   in 0s      

2012-03-23 00:18:26 (37.1 MB/s) - “/etc/yum.repos.d/public-yum-ol6.repo” saved [1461/1461]
For Oracle Linux 5, the file name would be public-yum-ol5.repo in the URL above instead. The "_latest" repositories that contain the errata packages are already enabled by default — you can simply pull in all available updates by running "yum update" next:
[root@oraclelinux62 ~]# yum update
Loaded plugins: refresh-packagekit, security
ol6_latest                                                    | 1.1 kB     00:00     
ol6_latest/primary                                            |  15 MB     00:42     
ol6_latest                                                               14643/14643
Setting up Update Process
Resolving Dependencies
--> Running transaction check
---> Package at.x86_64 0:3.1.10-43.el6 will be updated
---> Package at.x86_64 0:3.1.10-43.el6_2.1 will be an update
---> Package autofs.x86_64 1:5.0.5-39.el6 will be updated
---> Package autofs.x86_64 1:5.0.5-39.el6_2.1 will be an update
---> Package bind-libs.x86_64 32:9.7.3-8.P3.el6 will be updated
---> Package bind-libs.x86_64 32:9.7.3-8.P3.el6_2.2 will be an update
---> Package bind-utils.x86_64 32:9.7.3-8.P3.el6 will be updated
---> Package bind-utils.x86_64 32:9.7.3-8.P3.el6_2.2 will be an update
---> Package cvs.x86_64 0:1.11.23-11.el6_0.1 will be updated
---> Package cvs.x86_64 0:1.11.23-11.el6_2.1 will be an update

[...]

---> Package yum.noarch 0:3.2.29-22.0.1.el6 will be updated
---> Package yum.noarch 0:3.2.29-22.0.2.el6_2.2 will be an update
---> Package yum-plugin-security.noarch 0:1.1.30-10.el6 will be updated
---> Package yum-plugin-security.noarch 0:1.1.30-10.0.1.el6 will be an update
---> Package yum-utils.noarch 0:1.1.30-10.el6 will be updated
---> Package yum-utils.noarch 0:1.1.30-10.0.1.el6 will be an update
--> Finished Dependency Resolution

Dependencies Resolved

=====================================================================================
 Package                     Arch    Version                       Repository   Size
=====================================================================================
Installing:
 kernel                      x86_64  2.6.32-220.7.1.el6            ol6_latest   24 M
 kernel-uek                  x86_64  2.6.32-300.11.1.el6uek        ol6_latest   21 M
 kernel-uek-devel            x86_64  2.6.32-300.11.1.el6uek        ol6_latest  6.3 M
Updating:
 at                          x86_64  3.1.10-43.el6_2.1             ol6_latest   60 k
 autofs                      x86_64  1:5.0.5-39.el6_2.1            ol6_latest  470 k
 bind-libs                   x86_64  32:9.7.3-8.P3.el6_2.2         ol6_latest  839 k
 bind-utils                  x86_64  32:9.7.3-8.P3.el6_2.2         ol6_latest  178 k
 cvs                         x86_64  1.11.23-11.el6_2.1            ol6_latest  711 k

[...]

 xulrunner                   x86_64  10.0.3-1.0.1.el6_2            ol6_latest   12 M
 yelp                        x86_64  2.28.1-13.el6_2               ol6_latest  778 k
 yum                         noarch  3.2.29-22.0.2.el6_2.2         ol6_latest  987 k
 yum-plugin-security         noarch  1.1.30-10.0.1.el6             ol6_latest   36 k
 yum-utils                   noarch  1.1.30-10.0.1.el6             ol6_latest   94 k

Transaction Summary
=====================================================================================
Install       3 Package(s)
Upgrade      96 Package(s)

Total download size: 173 M
Is this ok [y/N]: y
Downloading Packages:
(1/99): at-3.1.10-43.el6_2.1.x86_64.rpm                       |  60 kB     00:00     
(2/99): autofs-5.0.5-39.el6_2.1.x86_64.rpm                    | 470 kB     00:01     
(3/99): bind-libs-9.7.3-8.P3.el6_2.2.x86_64.rpm               | 839 kB     00:02     
(4/99): bind-utils-9.7.3-8.P3.el6_2.2.x86_64.rpm              | 178 kB     00:00     

[...]

(96/99): yelp-2.28.1-13.el6_2.x86_64.rpm                      | 778 kB     00:02     
(97/99): yum-3.2.29-22.0.2.el6_2.2.noarch.rpm                 | 987 kB     00:03     
(98/99): yum-plugin-security-1.1.30-10.0.1.el6.noarch.rpm     |  36 kB     00:00     
(99/99): yum-utils-1.1.30-10.0.1.el6.noarch.rpm               |  94 kB     00:00     
-------------------------------------------------------------------------------------
Total                                                306 kB/s | 173 MB     09:38     
warning: rpmts_HdrFromFdno: Header V3 RSA/SHA256 Signature, key ID ec551f03: NOKEY
Retrieving key from http://public-yum.oracle.com/RPM-GPG-KEY-oracle-ol6
Importing GPG key 0xEC551F03:
 Userid: "Oracle OSS group (Open Source Software group) "
 From  : http://public-yum.oracle.com/RPM-GPG-KEY-oracle-ol6
Is this ok [y/N]: y
Running rpm_check_debug
Running Transaction Test
Transaction Test Succeeded
Running Transaction
  Updating   : yum-3.2.29-22.0.2.el6_2.2.noarch                                1/195 
  Updating   : xorg-x11-server-common-1.10.4-6.el6_2.3.x86_64                  2/195 
  Updating   : kernel-uek-headers-2.6.32-300.11.1.el6uek.x86_64                3/195 
  Updating   : 12:dhcp-common-4.1.1-25.P1.el6_2.1.x86_64                       4/195 
  Updating   : tzdata-java-2011n-2.el6.noarch                                  5/195 
  Updating   : tzdata-2011n-2.el6.noarch                                       6/195 
  Updating   : glibc-common-2.12-1.47.el6_2.9.x86_64                           7/195 
  Updating   : glibc-2.12-1.47.el6_2.9.x86_64                                  8/195 

[...]

  Cleanup    : kernel-firmware-2.6.32-220.el6.noarch                         191/195 
  Cleanup    : kernel-uek-firmware-2.6.32-300.3.1.el6uek.noarch              192/195 
  Cleanup    : glibc-common-2.12-1.47.el6.x86_64                             193/195 
  Cleanup    : glibc-2.12-1.47.el6.x86_64                                    194/195 
  Cleanup    : tzdata-2011l-4.el6.noarch                                     195/195 

Installed:
  kernel.x86_64 0:2.6.32-220.7.1.el6                                                 
  kernel-uek.x86_64 0:2.6.32-300.11.1.el6uek                                         
  kernel-uek-devel.x86_64 0:2.6.32-300.11.1.el6uek                                   

Updated:
  at.x86_64 0:3.1.10-43.el6_2.1                                                      
  autofs.x86_64 1:5.0.5-39.el6_2.1                                                   
  bind-libs.x86_64 32:9.7.3-8.P3.el6_2.2                                             
  bind-utils.x86_64 32:9.7.3-8.P3.el6_2.2                                            
  cvs.x86_64 0:1.11.23-11.el6_2.1                                                    
  dhclient.x86_64 12:4.1.1-25.P1.el6_2.1                                             

[...]

  xorg-x11-server-common.x86_64 0:1.10.4-6.el6_2.3                                   
  xulrunner.x86_64 0:10.0.3-1.0.1.el6_2                                              
  yelp.x86_64 0:2.28.1-13.el6_2                                                      
  yum.noarch 0:3.2.29-22.0.2.el6_2.2                                                 
  yum-plugin-security.noarch 0:1.1.30-10.0.1.el6                                     
  yum-utils.noarch 0:1.1.30-10.0.1.el6                                               

Complete!

At this point, your system is fully up to date. As the kernel was updated as well, a reboot is the recommended next action.

If you want to install the latest release of the Unbreakable Enterprise Kernel Release 2 as well, you need to edit the .repo file and enable the respective yum repository (e.g. "ol6_UEK_latest" for Oracle Linux 6 and "ol5_UEK_latest" for Oracle Linux 5) manually, by setting enabled to "1". The next yum update run will download and install the second release of the Unbreakable Enterprise Kernel, which will be enabled after the next reboot.

-Lenz

Website

Newsletter

Facebook

Twitter

Wednesday Jun 15, 2011

Pimp my Ride - Installing Additional Packages on Oracle Linux

Lee Cannon: Wings Wheels 2010
"Wings Wheels 2010" by Lee Cannon (CC BY-SA 2.0).

Oracle Linux already ships with an impressive amount of software packages which can be downloaded from our public Yum server.

For example, adding the external package repository for Oracle Linux 6.1 is a trivial task:

  1. Download and copy the appropriate yum configuration file in place, by running the following command as root:
    # wget -O /etc/yum.repos.d/public-yum-ol6.repo \
      http://public-yum.oracle.com/public-yum-ol6.repo
  2. Now edit the file using your favorite text editor and enable the appropriate repository ([ol6_u1_base] in our case) by changing the value of the enabled variable from 0 to 1.
  3. Now you can run yum list all to get a full list of all available packages. You can install them by running yum install <packagename>
However, being a distribution with a focus on the enterprise and data center, the package selection is limited to this scope. If you are looking for additional packages, you would have to either compile them from source or download pre-built binaries from an external package repository.

Enter EPEL, the "Extra Packages for Enterprise Linux" repository. According to their extensive FAQ, EPEL "is a volunteer-based community effort from the Fedora project to create a repository of high-quality add-on packages that complement the Fedora-based Red Hat Enterprise Linux (RHEL) and its compatible spinoffs, such as CentOS and Scientific Linux.".

Oracle Linux is based on RHEL, too, and is 100% userland-compatible with it. Therefore any package available from EPEL will install and run just fine, giving you access to a large pool of additional software. However, please keep in mind that this software is not covered by any Oracle Linux Support agreement you may have!

You can add and enable the EPEL repository by performing the following steps (as the root user):

  1. Download and install the repository package which includes the appropriate repository information for your version of Oracle Linux:
    rpm -Uvh http://download.fedora.redhat.com/pub/epel/6/x86_64/epel-release-6-5.noarch.rpm
  2. The repository is automatically enabled, which you can verify by running yum repolist.
  3. To get a listing of all the additional packages you now have access to, run yum list available | grep epel | less.
  4. Now simply run yum install <packagename> to install any of the additional packages (over 4800 for Oracle Linux 6, last time I counted!).
Enjoy!

See more articles about Oracle Linux at the Oracle Linux Blog!

About

Contributors:
Rick Ramsey
Kemer Thomson
and members of the OTN community

Search

Archives
« April 2014
SunMonTueWedThuFriSat
  
1
2
3
4
5
6
7
8
9
10
12
13
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
   
       
Today
Blogs We Like