When Less is More: NetEye Update and Upgrade Checkpoints
Hello everyone!
Today, I’d like to briefly discuss an improvement to the update and upgrade procedures that we’ve started to adopt with NetEye 4.39!
What we wanted to improve
One aspect that made quite an impact was that whenever the update or upgrade procedure stopped, even for legitimate reasons such as rpmnew or rpmsave files, it took a certain amount of time to reach the same step upon relaunching.
And yes, it’s true that our procedure is based on Ansible and hence targets the maximum possible idempotence, but the evaluation of the each step (to understand if it needs to be performed or not) still requires some time, and especially in large environments, this may be a slowdown during the update and upgrade procedure.
How to solve this?
Okay, so how could we improve on this?
Well, the first aspect that we need to consider is that our procedure is generally divided into blocks, especially for those services that have a dedicated upgrade procedure. Simplifying a bit, we can summarize both procedures into something similar to the diagram below, where each block can be assumed to be a set of Ansible tasks:
Now, NetEye 4.39 brings the architecture to a point where potentially upon the successful conclusion of a block, we can set a checkpoint! What do we mean by a checkpoint?
Well, it’s just a way to signal that, for that particular procedure (round of update or upgrade to a specific version), a specific step has already been performed successfully.
Why does this help? Because if the procedure stops at a later point, relaunching it will then allow us to skip all those blocks up to the last successful checkpoint, without having to “enter the block” and evaluate the conditions of all single Ansible tasks that made up that block, leading to quite a significant speed-up!
What NetEye 4.39 brings, concretely
Okay, so that’s the general idea. Now, what does NetEye 4.39 bring?
First of all it updates the architecture, allowing us to set, retrieve and evaluate the checkpoints.
Further, it already applies some checkpoints, which can already play a role in the upgrade from NetEye 4.38 to NetEye 4.39, to the update and upgrade procedures of the Elastic Stack components (yes, all of them!) and to the secure install stages, as shown below:
Of course, we look forward to an expansion of the checkpoints to all “blocks” of our procedures to ensure a smoother and faster experience during updates and upgrades.
See you at the next blog post and… happy holidays 🎅❄️
These Solutions are Engineered by Humans
Did you find this article interesting? Are you an “under the hood” kind of person? We’re really big on automation and we’re always looking for people in a similar vein to fill roles like this one as well as other roles here at Würth Phoenix.
Hi! I'm Davide and I'm a Software Developer with the R&D Team in the "IT System & Service Management Solutions" group here at Würth Phoenix. IT has been a passion for me ever since I was a child, and so the direction of my studies was...never in any doubt! Lately, my interests have focused in particular on data science techniques and the training of machine learning models.
Author
Davide Sbetti
Hi! I'm Davide and I'm a Software Developer with the R&D Team in the "IT System & Service Management Solutions" group here at Würth Phoenix. IT has been a passion for me ever since I was a child, and so the direction of my studies was...never in any doubt! Lately, my interests have focused in particular on data science techniques and the training of machine learning models.
Important: Icinga2 security update Type/Severity NetEye Product Security has rated this update as having a High security impact. Topic An update for the icinga2 packages is now available for NetEye 4. Security Fix for NetEye 4.44 2.15.1_neteye1.61.3-1 CVEs CVE-2025-61907: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N CVE-2025-61908: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVE-2025-61909: Read More
Important: Elastic Stack security update Type/Severity NetEye Product Security has rated this update as having a High security impact. Topic An update for the elasticsearch and kibana packages is now available for NetEye 4. Security Fix for NetEye 4.44 9.0.8_neteye3.85.1-1 CVEs CVE-2025-25009: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N Read More
In NetEye, 'business processes' is a module used to model and monitor the business process hierarchy to obtain a high-level view of the status of critical applications. In short, they allow monitoring controls of individual components to be aggregated into Read More
If you've worked with Elastic APM, you're probably familiar with the APM Server: a component that collects telemetry data from APM Agents deployed across your infrastructure. But what happens when you need to segregate that data by tenant, especially in Read More
Satellite config creation in HA mode using zone names with whitespaces We've addressed an issue where running the neteye satellite config create for a satellite configured in HA mode having whitespaces in the Zone name prevented the procedure to successfully Read More