We periodically login to system to retrieve and install updates using the following commands:
Lost connection to systems running OVS, herewith the last output:
Had to connect to the system using the Intel RMM (Remote Management Module) and then perform the following actions to restore connectivity:
We subsequently had to reference VM network configurations (grep net /etc/pve/local/qemu-server/*.conf) and reattach the tun interfaces to OVS:
Surely Proxmox should be vetting these updates before releasing them? OVS should either not be shutdown during the update process (perhaps requiring a manual system reboot) or recover again sufficiently after installing updates as not to disrupt services...
Code:
apt-get update; apt-get -y dist-upgrade; apt-get -y autoremove;
Lost connection to systems running OVS, herewith the last output:
Code:
Unpacking pve-manager (4.3-12) over (4.3-9) ...
Preparing to unpack .../proxmox-ve_4.3-72_all.deb ...
Unpacking proxmox-ve (4.3-72) over (4.3-71) ...
Preparing to unpack .../openvswitch-switch_2.6.0-2_amd64.deb ...
Had to connect to the system using the Intel RMM (Remote Management Module) and then perform the following actions to restore connectivity:
Code:
/etc/init.d/openvswitch-switch start
We subsequently had to reference VM network configurations (grep net /etc/pve/local/qemu-server/*.conf) and reattach the tun interfaces to OVS:
Code:
ovs-vsctl add-port vmbr0 tap100i0 tag=847
ovs-vsctl add-port vmbr0 tap101i0 tag=3352
Surely Proxmox should be vetting these updates before releasing them? OVS should either not be shutdown during the update process (perhaps requiring a manual system reboot) or recover again sufficiently after installing updates as not to disrupt services...