/srv/irclogs.ubuntu.com/2019/11/15/#ubuntu-server.txt

=== led_dark_2 is now known as led_dark_1
dutchiehi, is this the right place to ask about the canonical-livepatch service? I'm having it failing with 403 errors, even after I've disabled and re-enabled it10:17
dutchieduring refresh: cannot check: cannot send status to server: bad server status 403 (URL: https://livepatch.canonical.com/api/machine/c13151cc85df441a84c14fa33a7ed6e3): {"error": "Not checking for new patches based on reported livepatch state. State: kernel-upgrade-required"}10:21
tomreyndutchie: i assume you'd need to contact your canonical sales rep directly about it. but before you do, check whether you can     curl https://livepatch.canonical.com/10:40
dutchieI am just using the free tier, so I don't have a sales rep10:40
tomreynsee also https://wiki.ubuntu.com/Kernel/Livepatch about requirements10:41
tomreynand verify that your api key is properly registered10:41
tomreynthe contact provided at https://snapcraft.io/canonical-livepatch is mailto:snaps@canonical.com10:41
dutchieah, that's probably a reasonable starting point10:43
dutchieit used to be working and I'm not sure what changed10:43
tomreyni'm just another boring user, could not tell.10:44
tomreyni assume that https://auth.livepatch.canonical.com/ enables you to manage your tokens.10:48
fricklerdutchie: this latest lsn says that the patches can't be livepatched, so you need to do a real kernel update https://lists.ubuntu.com/archives/ubuntu-security-announce/2019-November/005193.html10:49
fricklerin particular I think you can't do a live microcode update10:50
dutchiethese are VPSs so microcode isn't an issue, and I feel like the 403 is orthogonal to that10:50
dutchieI should reboot anyway though10:50
fricklerdutchie: well, that's what I read into your "State: kernel-upgrade-required"10:51
dutchiehmm, true10:51
dutchieok, it seems to be good after a reboot10:53
fricklerthere are also rumours that that new microcode can severely impact performance. well at least for those who consider 20% or so severe10:54
dutchiegreat, all sorted now, thanks tomreyn and frickler10:59
tomreyndutchie: so it was just the reboot?10:59
tomreynfrickler: do you happen to have a link ready to such reports?10:59
fricklertomreyn: it's on the wiki page you cited: "Livepatch Security Notices (LSN) are only available by subscribing to the Ubuntu Security Announcements mailing list." you can then check the archives for LSNs from that mailman link11:12
tomreynfrickler: thanks, but i'm asking about "rumours that that new microcode can severely impact performance", sorry if this was unclear. i did find https://www.phoronix.com/scan.php?page=article&item=intel-jcc-gaming about performance impact for gaming.11:15
fricklertomreyn: ah, there were some things on twitter regarding it, let me check if I can still find them11:16
OerHeksall Intel patches have impact, nothing new about that11:17
fricklerhttps://twitter.com/damageboy/status/1194751035136450560 is where I saw the 20% mark11:18
tomreyn20% seems unlikely for generic workloads. intel says 0-4%, with some spikes doing worse, which was apparently confirmed at https://www.phoronix.com/scan.php?page=article&item=intel-jcc-microcode11:23
tomreynso it's 20% for array.sort() before compiler patches.11:29

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!