Skip to main content
cPanel Technical Support has been heavily impacted by hurricane Beryl and our ability to respond to tickets has been hindered as a result. We appreciate your understanding and patience as we address these delays.

Elevate blockers: python36 and elrepo

Comments

9 comments

  • cPRex Jurassic Moderator
    Hey there! kmod-ixgbe isn't something that comes with cPanel, so I can confirm it wouldn't be needed by our tools. However, I wouldn't be able to say if removing it would affect something else on the system. I did check a version 108 system running on CentOS 7, and I did not see any python3 packages on that machine. The system version and cPanel version are still 2.7 there: cpanel-system-python27-2.7.18-1.cp108~el7.x86_64 python-2.7.5-92.el7_9.x86_64
    so those would need to all be removed before the upgrade can happen.
    0
  • PeteS
    Thanks, @cPRex These are Vultr instances, and I setup a test instance today of the same type used initially, and this is what I find: 1) I do see Python3.6 is installed, as well as 2.7.5, but I can't find anything using it, nor think of anything I installed that would have added it. I'm assuming I can safely remove it, but I'm not 100% sure how best to check that nothing is using it first. Thoughts? 2) What's odd is that elrepo is NOT on the fresh test instance, but IS on all my cPanel servers. Even the DNSOnly servers, which are just the Vultr CentOS 7 install and then DSOnly installed. I definitely can't think of anything I have done on all servers that would add kmod-ixgbe (whatever that is)! Initially I assumed it was something Vultr added, but apparently not. So again I'm left assuming I can remove everything elrepo and proceed, but... I'd love to know for sure. Any ideas on this one? (I've posted in Github about these as well... awaiting response there also, and will cross-post any answers I get.)
    0
  • Steve Kemp
    Thanks, @cPRex These are Vultr instances, and I setup a test instance today of the same type used initially, and this is what I find: 1) I do see Python3.6 is installed, as well as 2.7.5, but I can't find anything using it, nor think of anything I installed that would have added it. I'm assuming I can safely remove it, but I'm not 100% sure how best to check that nothing is using it first. Thoughts? 2) What's odd is that elrepo is NOT on the fresh test instance, but IS on all my cPanel servers. Even the DNSOnly servers, which are just the Vultr CentOS 7 install and then DSOnly installed. I definitely can't think of anything I have done on all servers that would add kmod-ixgbe (whatever that is)! Initially I assumed it was something Vultr added, but apparently not. So again I'm left assuming I can remove everything elrepo and proceed, but... I'd love to know for sure. Any ideas on this one? (I've posted in Github about these as well... awaiting response there also, and will cross-post any answers I get.)

    You mention you see this on Vultr instances.. ive found a few of mine at Vultr are returning the blocker: *** Elevation Blocker detected: *** Your machine has multiple network interface cards (NICs) using kernel-names (ethX). Since the upgrade process cannot guarantee their stability after upgrade, you cannot upgrade. but i asked Vultr support and they say its an issue in elevate perhaps? have you seen this happen?
    0
  • PeteS
    You mention you see this on Vultr instances.. ive found a few of mine at Vultr are returning the blocker: *** Elevation Blocker detected: *** Your machine has multiple network interface cards (NICs) using kernel-names (ethX). Since the upgrade process cannot guarantee their stability after upgrade, you cannot upgrade. but i asked Vultr support and they say its an issue in elevate perhaps? have you seen this happen?

    I haven't seen that blocker on any of my Vultr instances. Have you searched the Elevate Github for this issue? If it's not there I would open an issue about it.
    0
  • Steve Kemp
    no i had not got that far yet... but will check it out
    0
  • cPRex Jurassic Moderator
    cPanel in general hasn't really support individual network interfaces, so that isn't unique to ELevate. As far as Python 3.6, all I can confirm is that it's not something we install, so it's likely part of their image. elrepo is just another repository. We just don't want the OS upgrade to install things from that package instead of from the native OS repo to avoid conflicts.
    0
  • InterServed
    In preparation to run Elevate (to Alma) I am seeing the following blockers on all (CentOS 7) servers. 1) [ERROR] 2 package(s) installed from unsupported YUM repo 'elrepo' from /etc/yum.repos.d/elrepo.repo Offending packages: elrepo-release.noarch 7.0-6.el7.elrepo @elrepo kmod-ixgbe.x86_64 5.12.5-2.el7_9.elrepo @elrepo 2) [WARN] *** Elevation Blocker detected: *** A package providing python36 has been detected as installed. Please remove it before elevation: yum remove python3 I can't find the python 3.6 offender(s) by grep on yum list installed. (I find lots of python, but not anything I can tell is the specific 3.6 version.) I could remove all of these, but I can't find much info as to what the results would be, so I'm asking here first. Has anyone encountered these? Can anyone shed light on what they do or where they came from, or how best to research them further? -Pete

    note that you may have more python packages installed, such as: [~]: rpm -qa|grep python3|grep -v alt- python36-rpm-4.11.3-10.el7.x86_64 python3-3.6.8-18.el7.x86_64 python36-psutil-5.6.7-1.el7.x86_64 python3-setuptools-39.2.0-10.el7.noarch python36-rpmconf-1.1.7-1.el7.1.noarch python3-libs-3.6.8-18.el7.x86_64 python3-pip-9.0.3-8.el7.noarch
    yum remove python36* should do the trick.
    0
  • PeteS
    For those it will help, Vultr says: "kmod-ixgbe is a kernel module for Intel network interfaces on some of our bare metal systems, and we include it in our operating system images by default in order to support those bare metals. It's not used at all on VMs, and you can safely remove it from this VPS if you want."
    0
  • cPRex Jurassic Moderator
    Thanks for sharing!
    0

Please sign in to leave a comment.