There may be several action items for you to address in the Leapp preupgrade report in /var/log/leapp/leapp-report.txt. An inhibitor is a blocking item which you will need to address in order to proceed with the upgrade. If inhibitors are not resolved, a leapp upgrade will not be performed on the system.
The risk factor describes the effect of an upgrade consideration using the following keys:
| High | Very likely to result in a deteriorated state |
| Medium | Could affect both the system and applications |
| Low | Should not affect the system but could have an effect on applications |
| Info | Informational with no expected effect to neither the system nor applications |
The title identifies an element of the Leapp preupgrade report and the summary provides you with more information.
The summary provides a short description of the issue detected that may need to be addressed.
A remediation is an actionable solution to a reported problem. Common remediation types include:
- editing a configuration file.
- running a command which changes the way your system behaves.
- remediation via the Leapp answerfile.
- remediation affecting modularity software from the Red Hat Enterprise Linux 7 Software Collections Library, such as Python, PHP, Node.js, PostgreSQL, etc.
- temporarily unmounting NFS exports.
Examples of upgrade considerations for high and medium risk factors are showcased in this section and structured to include:
- The message reported in the Leapp report—in the example snippet.
- The software subsystem affected.
- An explanation of what the reported item means.
- Action you should take.
- The consequences of not addressing the reported actionable item.
Your systems may exhibit different considerations dependent on the version of Red Hat Enterprise Linux you are upgrading to and your configuration.
Example 1: A high risk inhibitor requiring temporary changes to your system
This is an example of a high rated inhibitor issue reported by the preassessment report. If this issue is not corrected, a leapp upgrade run on this system will present an error and not upgrade the system. Besides theage itself, we will review how to resolve this issue on the system.
Risk Factor: high (inhibitor)undefined
Title: Use of NFS detected. Upgrade can't proceed
Summary: NFS is currently not supported by the inplace upgrade.
We have found NFS usage at the following locations:
- One or more NFS entries in /etc/fstab
- Currently mounted NFS shares
Remediation: [hint] Disable NFS temporarily for the upgrade if possible.
Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed
What if I don’t take care of this note?
It is an inhibitor and will prevent the upgrade from proceeding until the appropriate action is taken. The risk factor is high because changes are expected to be made to the local server only and not NFS shares.
What subsystem is affected?
NFS mounts.
What does it mean?
NFS mounts cannot be used during the upgrade process and must be unmounted and disabled until the upgrade has finished.
What must I do?
Edit /etc/fstab to temporarily comment out NFS shares and unmount currently mounted NFS shares. Temporarily stop and disable autofs.service. The NFS entries and autofs.service can be re-enabled once the upgrade concludes.
[root@leapp8to9 ~]# systemctl disable —now autofs.service
Example 2: A high risk inhibitor requiring changes to an existing configuration file
This is largely applicable to upgrading from Red Hat Enterprise Linux 7 to Red Hat Enterprise Linux 8.
Risk Factor: high (inhibitor)
Title: Possible problems with remote login using root account
Summary: OpenSSH configuration file does not explicitly state the option PermitRootLogin in sshd_config file, which will default in Red Hat Enterprise Linux8 to "prohibit-password".
Remediation: [hint] If you depend on remote root logins using passwords, consider setting up a different user for remote administration or adding "PermitRootLogin yes" to sshd_config.
Key: 3d21e8cc9e1c09dc60429de7716165787e99515f
What if I don’t take care of this note?
It is an inhibitor and will prevent the upgrade from proceeding but it is worth noting that the risk factor is high and incorrectly addressing this item could prevent you from remotely logging into your server using secure shell (SSH).
What subsystem is affected?
The ssh server (sshd.service).
What does it mean?
This snippet tells you that there is a high impact change between the way that the SSH server works between Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8. Password authentication is disallowed for the root user in Red Hat Enterprise Linux 8 by default. In Red Hat Enterprise Linux 7, the implied default value for PermitRootLogin is yes, but in Red Hat Enterprise Linux 8, the implied default value is prohibit-password.
An implied configuration directive appears as a comment inside /etc/ssh/sshd_config, but it is not a comment. It appears to inform you of the directive’s default values.
What must I do?
Ensure that you are able to login as another user—either with a password or without.
You must explicitly set a value for PermitRootLogin inside /etc/ssh/sshd_config. The value could be yes to allow the root user to login via ssh or no to prevent this. What matters is that the directive is explicitly set.
Linux man pages are wonderful sources of additional information. Use the command man sshd_config and search for the string PermitRootLogin to learn more about this configuration directive.
Example 3: A high risk inhibitor requiring the use of the leapp answerfile
This specific issue is largely applicable to upgrading from Red Hat Enterprise Linux 7 to Red Hat Enterprise Linux 8. The unique element of this example is that it requires remediation using the leapp answerfile, a file in which data can be automatedly passed to the leapp utility.
Risk Factor: high (inhibitor)
Title: Missing required answers in the answer file
Summary: One or more sections in answerfile are missing user choices: remove_pam_pkcs11_module_check.confirm
For more information consult https://leapp.readthedocs.io/en/latest/dialogs.html
Remediation: [hint] Please register user choices with leapp answer cli command or by manually editing the answerfile.undefined[command] leapp answer --section remove_pam_pkcs11_module_check.confirm=True
Key: d35f6c6b1b1fa6924ef442e3670d90fa92f0d54b
What if I don’t take care of this note?
It is an inhibitor and will prevent the upgrade from proceeding until you authorize the removal of the pam_pkcs11 module. The risk factor is high because you may have the requisite or required control values associated with the pam_pkcs11 module in your PAM configuration, and the removal of this module in Red Hat Enterprise Linux8 could lock you out of your system.
This upgrade item may only be resolved by using the Leapp answer file.
What subsystem is affected?
Authentication (pam).
What does it mean?
This snippet tells you that the pam_pkcs11 module is removed from Red Hat Enterprise Linux8 and its functionality is now provided by sssd.
What must I do?
Edit /var/log/leapp/answerfile as follows:
[remove_pam_pkcs11_module_check]
confirm = True
Or run the following command to edit the answerfile /var/log/leapp/answerfile:
leapp answer --section
remove_pam_pkcs11_module_check.confirm=true
You must also verify that there are other ways for you to authenticate which do not rely on the pam_pkcs11 module.
This can be verified by running grep pam_pkcs11 /etc/pam.d/*