Posted on 01-23-2012 11:13 AM
Hi everyone,
I'm looking for feedback and recommendations on using Casper to manage and deploy software updates and packages on managed Macintoshes in our environment.
I have very modular images right now - the base image is only OSX, iLife, and iWork, along with some basic settings. All other applications are deployed via packages, and all settings and preferences are deployed either via package or as a managed preference in Casper.
This academic year I've decided to step up enforcement of keeping applications up to date, especially those that are vulnerable to security issues (Web browsers, Flash Player, etc). How I have it configured right now is I have created smart groups based on software installed (i.e., there is a group called 'Firefox', a group called 'Microsoft Office', which is also has a variable based on version number. If the computer has 'Firefox' that isn't version '9.0.1', it downloads the package from Casper, caches it, to be installed at a later time.
I thought this solution would be good, except an issue I'm seeing is that newly imaged machines are downloading and installing packages that have already been installed during the imaging process. I'm guessing this is because on a newly imaged machine, this policy is executing before the recon inventory has been submitted and processed by the computer to the JSS. This has made me re-consider my current workflow to prevent this from occurring.
My question to JAMF Nation is what could I do to improve upon this workflow, to cut down on these policies being executed on newly imaged computers? I welcome suggestions and feedback, and I would love to know how others are doing software/update patch management using JSS. Thanks!
Posted on 01-23-2012 12:03 PM
One thing you could consider is having policies assigned to computers to run once per computer, then when you have a patched version to apply, you modify the policy to include the update or new version and flush the history for that policy. It will then run again for each computer. I recently did this for Adobe Reader 10.1.2 and we're starting to do this for most of our policies.
The only catch is that if you want to ensure that this policy runs for reimaged computers, you need to flush policy history as part of the imaging process, which can be done with a script.
Posted on 01-23-2012 12:36 PM
All of my Casper servers run on OS X Server, and all of them also run the SUS service. I have one main SUS and 5 that cascade from it. Then set up the SUS servers in the JSS and assign them by network segments. Then create a self service policy that users can trigger that installs all updates and forces a reboot.
For non Apple products I see if there is a PKG or MPKG and drop it into Casper Admin. Then create policies to install it. If I have to repackage the app for an update I usually update it and see if an overwrite does the trick, otherwise index the app, uninstall it first, then run the install after.
Posted on 01-23-2012 12:40 PM
Thanks for your reply. I already have these policies to push out the updates set at running at once per computer. I think my main problem is that the newly imaged or re-imaged computers already are receiving some of these packages when they are imaged through a configuration in Casper Admin, and then again through the policy that runs on all the managed computers, so the download ends up getting duplicated.
Posted on 01-23-2012 12:59 PM
Have it set once per a computer, and then when it reimages have it flush the logs for that computer so updates can be reapplied. For official Apple Updates, JAMF uses the software update binary that will check for current updates and only apply those you need. SUS can manage that by allowing you to set up what you need.
Posted on 01-23-2012 01:55 PM
Tom,
Are you programmatically flushing a computers logs at re-imaging, or is that a manual process?
I like the sound of that, but not sure how I'd coordinate to do that with half a dozen techs around the country never knowing (or caring) when they reimage machines
thanks,
Darrin
Posted on 01-23-2012 02:04 PM
So, I'm guessing that my best approach to non Apple SUS updates is to remove them from the Casper Imaging configurations and instead let them be applied by the policies I already have setup for computers that are already managed by the JSS?
I'm pretty happy with my current configuration of Apple updates. I have newly imaged machines download and install them automatically after imaging. Managed computers also download install Apple updates once a week, at login, and both policies seem to be working as I anticipated they would.
Posted on 01-24-2012 07:45 AM
Yes, your best bet is to use the policies only and not have the software install through the configuration. We actually don't have any software install as part of the configuration. They're all assigned to the regular chceck-in trigger (everyHour in our case).
Our configurations have a script set to At Reboot that contains the command to flush the policy history (jamf flushPolicyHistory), update inventory (jamf recon) and to trigger the regular policy check-in (jamf policy -trigger everyHour).
Posted on 01-24-2012 08:06 AM
I don't see why its better to have 'empty' configurations, otherwise what is the real point of Casper Admin?
Surely better to have base configurations, OS, Apps etc and the policies for updates?
Anyone gone down the reposado path for SUS?
Posted on 01-24-2012 08:13 AM
I can see benefits both ways, with a config that is fully ready and with one that is OS only.
With a fully ready config you can compile the config and push in less than 10 minutes normally. That helps if you need to push out a lot of machines, or just need to get the base apps on your machines quickly. The down side to this is that if there is an update to an app, like Flash or Firefox, you are having to re-build your config and re-compile it, which takes time.
If you use the OS only config method, then any time there is an app update, you only have to update the policy that pushes that app and there is no re-compile time involved. This, to me, would be a true modular approach co imaging.
In the end, it all comes down to what works best for your environment. I've traditionally been one to use a config that contained all of my base apps, but I'm beginning to look more at thin imaging, applying just an OS and handling everything else with policies. I think this method gives me more flexibility in keeping the base apps updated.
Just my 2 pennies....
Steve
Posted on 01-24-2012 08:28 AM
See what your saying here Steve and I can see some sense it that.
I run with a base software list, then smart folders off that with specific requirements, thus its pretty simple to update all my base software in one go.
The smart folders just contain an OS and maybe a major package like CS5
101 ways eh :)
Posted on 01-24-2012 08:53 AM
I have an updated and compiled base OS as a parent config in CA
and stuff the rest of the apps in different Smart Configs.
If there is an app update I use the "replace in all configurations" option in CA to update my configs.
But as mentioned already, it totally depends on your environment and needs.
Anyone gone down the reposado path for SUS?
Yep, love it :)
Posted on 01-24-2012 09:21 AM
sorry, this may be a thread hijack... Chris... Reposado.. anything I should look out for?
Posted on 01-24-2012 09:39 AM
The docs on the GitHub page are actually pretty straight forward,
and http://groups.google.com/group/reposado helps a lot too.
I'm running it on Windows Server 2k8 with IIS.
Posted on 01-24-2012 11:44 AM
I think I kind of worked this out on my own. I appreciate the feedback from everyone.
I found my biggest mistake was the criteria I was using for the Smart Groups. I was building the Smart Groups for deploying software updates by having it check to see if it had a pre-existing receipt from Casper that resides in /Library/Application Support/JAMF/Receipts. The policy was set to cache the software package if the most current version of the receipt (and in turn the software) wasn't installed.
The problem that was occurring is that on newly imaged computers, the Recon report wasn't being run and processed quickly enough for that inventory of receipts to be taken and compared to, before other policies were being triggered. So using the logic I was applying, the 'deploy cached update XYZ' policies would trigger because those receipts were not yet present in the JSS, even though they may have already been installed by Casper Imaging.
I've since corrected this by not using the receipts as a pre-requisite in the Smart Group, but instead, making sure it checks to see if the software and appropriate version is pre-installed. Since the Recon report isn't available, the opposite logic will apply, as it will not see that for example Firefox has been installed, so it will ignore the policy to update it at that time. Later on, once the inventory report has been run and processed by the JSS, the policy will check to see what version of the software is installed, and deploy the cached package, if required.
Posted on 01-24-2012 01:27 PM
So Ted, the policy would be scoped to "has app 1.1" when deploying "app 1.2"?
Meaning "app 1.1" has to be found 1st before "app 1.2" is deployed?
Posted on 01-25-2012 06:44 AM
my preferred method for enforcing app and os updates is to use munki and reposado. i'm in a casper shop right now, so casper handles app updates here. for most app updating, munki works better with minimal fuss. i find i have to monkey around (no pun intended) to get casper's tools to do what munki does out of the box for free.
setting up reposado is easy. if you aren't using it yet, please do so. it's more flexible than apple's sus and can be hosted anywhere with python and a web server installed.
Posted on 01-25-2012 02:32 PM
Nate,
I'm a big fan of Munki. I use it along with DeployStudio at my part-time consulting position, which is a local state college with no funds. It works great, but I still prefer Casper.
Posted on 01-25-2012 02:42 PM
Ben,
Yes that's sort of the idea. I'll use Firefox 9.0.1 as an example of what I'm doing.
I have a Smart Group that is built using the following criteria:
Smart Group Name: 'Update Firefox'
Membership Criteria: Application Title has Firefox
-and- Application Version not like 9.0.1
-and- Application Version not like 9.0.2
-and- Application Version not like 9.0.3
-and- Application Version not like 10.0
-and- Application Version not like 11.0
The extra version numbers are there so I don't 'step' on people running alphas and betas, and to give me some time to package up security releases. I could be more strict if I wanted. This criteria catches anyone with 9.0.0 and earlier to update.
I then create a 'Deploy Firefox' policy, to install cached, Firefox 9.0.1. The scope is the 'Update Firefox' smart group. The download is triggered by the every15 flag in the Casper. We already have policies on various groups of machines, that install any available cached packages at various triggers.
So far, so good. Still wondering if this is the best workflow...