It’s not, NetworkManager does not mark an installation as unhealthy, only unsupported.
Isn’t this whole thread about NetworkManager preventing upgrades? The only things in the logs are network manager and docker logging, and maybe unrelated, I can’t upgrade anything.
This is also something that has been logged for almost a year now with the message that it will break in the future.
What log message is this? I have never seen it. I also have never seen an issue with AppArmour on Ubuntu. What issue are you talking about, I can’t find anything on Github - Issue search results · GitHub
It might be, but other software can affect how elements on the host operate, and the Supervisor needs to 100% trust the host to be able to do what it needs to do, the rules need to be strict to ensure that when it does what’s expected of it, it does not break the system further.
I understand that, which is why I don’t do anything with hardware without an abstraction e.g. usb/ip. Not allowing something like watchtower, to automatically update unmanaged containers with security updates makes maintaining security updates horribly expensive (or not going to happen).
I understand the point of developers. A bunch of users are diving into Linux via HA, it’s got to be hell to handle that.
If you run Home Assistant OS in the VM it does, if not then you are responsible for that.
That’s my exact point. I apply updates to my clusters using automatic, robust, cluster aware, rolling reboots, aided by monitoring and alerting. Requiring this VM to be a snowflake (basically a HassOS install with more work) makes HA inherently insecure when it can’t play nice with existing infrastructure. It also means I can’t use my larger network e.g. distributed storage.
I again have to choose between a secure and flexible network, or a supported HA instance. The options for a supported system:
- Run HassOS (which likely doesn’t support major VM vendors e.g. Hyper-V integration)
- Lose automatic backups.
- Lose security updates from upstream (or I have to trust HassOS to constantly watch CVE lists).
- Lose standard monitoring/logging/discoverability/etc.
- Run Debian 10 Supervised
- Basically the same stuff as running HassOS, but without automatic updates.
That sucks for anyone that’s not running HA on a raspberry pi or running more then 10 VMs.
The healthy condition was implemented to protect the system, that is the only reason, no secret agenda or a hidden “screw you” to anyone, this was purely for protection of the systems that the Supervisor runs on.
Then we should have a way to bypass. I went into using supervisor knowing that I was responsible if something broke. That there wouldn’t be community support, etc. This artificial limitation to prevent breaking features I don’t use or care about is why I’m frustrated.
I personally demand more for my production systems I have in my home.
- Timely security updates, even my Hyper-V hypervisors get automated cluster aware monthly updates.
- Node level failover when possible.
- All the standard alerting, monitoring
- Network intrusion detection, end-to-end transport encryption, encryption at rest.
I understand that most home users don’t care or need all of that. But these things should at least be possible and encouraged.
just disable the healthy condition that was implemented to protect the system.
This can be done with ha jobs
CLI, the API, or by creating a file in the data dir for the Supervisor.
Thanks! If I knew about this, I honestly wouldn’t have gotten so annoyed. Now I’m feeling a little foolish…
My main machine (which I use for development) is running Ubuntu, and I have a healthy system, so it is possible.
For me, it’s about not being about to tell what makes it unhealthy. All I see are warnings about things being unsupported. Absolutely no errors or warnings making the system unhealthy.
Is it the docker logs making it unhealthy? Is it the network manager version/config? Is it the missing audio devices? Or maybe the OS version? I can’t tell. Every single warning mentions a link to the “unsupported” section of the docs.
I’ll end this with,
The user should ultimately make that risk/reward analysis, that’s the whole point on HA, IMO. TPLink pushed an update, because their local control API wasn’t encrypted.They disabled the local control API. They did this because they thought the should be protecting users. They removed the user’s ability to have a say. That’s what HA is fighting against.