Your message dated Sat, 26 Oct 2019 07:09:15 +0000 with message-id <[🔎] E1iOGCJ-000AcT-B2@fasolo.debian.org> and subject line Bug#943378: Removed package(s) from unstable has caused the Debian Bug report #505996, regarding bcfg2: Include random Sleep before running on cronjob to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 505996: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505996 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: bcfg2: Include random Sleep before running on cronjob
- From: Marc Fargas <marc@marcfargas.com>
- Date: Mon, 17 Nov 2008 17:26:18 +0100
- Message-id: <20081117162618.25603.83252.reportbug@castor.fargas.local>
Package: bcfg2 Version: 0.9.5.7-1.1 Severity: wishlist Hi there, Right now all bcfg2 clients will run at the very same time in a common scenario (i.e. from the cronjob provided) that can, in my case does, kill the server. Maybe the cron job could do some "random" sleeping before running the agent, just like /etc/cron.daily/apt does, i.e: sleep `$(($(dd if=/dev/urandom count=1 2> /dev/null | cksum | cut -c"1-5") % 1800))` Or, from /etc/cron.daily/apt: # sleep for a random interval of time (default 30min) # (some code taken from cron-apt, thanks) random_sleep() { RandomSleep=1800 eval $(apt-config shell RandomSleep APT::Periodic::RandomSleep) if [ $RandomSleep -eq 0 ]; then return fi if [ -z "$RANDOM" ] ; then # A fix for shells that do not have this bash feature. RANDOM=$(dd if=/dev/urandom count=1 2> /dev/null | cksum | cut -c"1-5") fi TIME=$(($RANDOM % $RandomSleep)) sleep $TIME } That would distribute the hourly load spike a bit ;) Thanks, Marc -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (900, 'testing'), (300, 'unstable'), (150, 'experimental'), (100, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/2 CPU cores) Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash
--- End Message ---
--- Begin Message ---
- To: 505996-done@bugs.debian.org,586716-done@bugs.debian.org,905671-done@bugs.debian.org,921237-done@bugs.debian.org,936189-done@bugs.debian.org,880882-done@bugs.debian.org,
- Cc: bcfg2@packages.debian.org
- Subject: Bug#943378: Removed package(s) from unstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sat, 26 Oct 2019 07:09:15 +0000
- Message-id: <[🔎] E1iOGCJ-000AcT-B2@fasolo.debian.org>
Version: 1.4.0~pre2+git141-g6d40dace6358-2+rm Dear submitter, as the package bcfg2 has just been removed from the Debian archive unstable we hereby close the associated bug reports. We are sorry that we couldn't deal with your issue properly. For details on the removal, please see https://bugs.debian.org/943378 The version of this package that was in Debian prior to this removal can still be found using http://snapshot.debian.org/. This message was generated automatically; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org. Debian distribution maintenance software pp. Scott Kitterman (the ftpmaster behind the curtain)
--- End Message ---