=====Using the Patching Script=====
All this is done on the appropriate REPO server (dubrhsatserver62 or DUBORA73UPPROD)
1: Edit the hostname_list this is located in /scripts/access_check
You need to create a file that contains the server names of the VMs that are scheduled to be patched on this pass (ie VMS due to be patched that day)
2: Check access to all VMs for that day
Edit access_check_1.3.sh Located on /scripts/access_check/access_check_1.3.sh or Teams under Linux_documentation/Linux Bash Scripts
Modify the 2 following lines
VAR_access="PASSWORD " | sudo -S hostname ; cat /etc/crontab |grep yum_update_RHEL.sh"
sshpass -p "PASSWORD" ssh -t -o "StrictHostKeyChecking no" USERNAME@$HOST $VAR_access | tee -a $SCR_FLOW
Replace PASSWORD with your password and USERNAME with your username
Run the script
./access_check_1.3.sh
If you see something that looks like this
#################################################
# #
# Warning, Unauthorized Access Prohibited #
# #
#################################################
[sudo] password for brindleyp: Template-OL7
Connection to 10.5.5.44 closed.
Then connection was made ok and password is correct if you don’t you will need to check that machine
3: edit RHEL_patch_script_set.sh (for RedHat) or OL_patch_script_set.sh (for Oracle)
Files are located under scripts/access_check/ or in Teams under Linux Documentation/Linux Server Quarterly Patching/Patching scripts
Modify following Lines
**Redhat**
VAR_access="hostname ; echo “PASSWORD" | sudo -S sed -i '/yum_update_RHEL.sh/c\00 23 20 jan '*' root /scripts/yum_update/yum_update_RHEL.sh' /etc/crontab ; echo "PASSWORD" | sudo -S cat /etc/crontab |grep yum_update_RHEL.sh"
And
sshpass -p "PASSWORD” ssh -t -o "StrictHostKeyChecking no" USERNAME@$HOST $VAR_access | tee -a $SCR_FLOW
**ORACLE**
VAR_access="hostname ; echo "PASSWORD" | sudo -S sed -i '/yum_update_OL.sh/c\00 23 10 may '*' root /scripts/yum_update/yum_update_OL.sh' /etc/crontab ; echo "PASSWORD" | sudo -S cat /etc/crontab |grep yum_update_OL.sh
And
sshpass -p "PASSWORD" ssh -t -o "StrictHostKeyChecking no" USERNAME@$HOST $VAR_access | tee -a $SCR_FLOW
Replace PASSWORD with your password
20 jan or 10 may with the appropriate date for crontab format is DD month
USERNAME with your username
This will modify the crontab of the servers with the date you put. Servers will be patched at 11 PM
REMEMBER to either edit or remove the files!!! They contain your Linux password!!!