• Please be aware: Kaspersky Anti-Virus has been deprecated
    With the upgrade to Plesk Obsidian 18.0.64, "Kaspersky Anti-Virus for Servers" will be automatically removed from the servers it is installed on. We recommend that you migrate to Sophos Anti-Virus for Servers.
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.
  • We’re working on enhancing the Monitoring feature in Plesk, and we could really use your expertise! If you’re open to sharing your experiences with server and website monitoring or providing feedback, we’d love to have a one-hour online meeting with you.

Question Linux kernel update 5.10 on Ubuntu 20.04

josephGW

New Pleskian
Hello Everybody,

Did someone tried to install the latest linux kernel ( 5.10.2 ) or the 5.8 on Ubuntu 20.04 LTS with Plesk Obsidian?

Could it break plesk functionalities ?

Thanks by advance.
 
Last edited:
@josephGW We switched to the Official Ubuntu HWE release kernel on Ubuntu 20.04.1 LTS / Plesk Obsidian (see forum signature) and have experienced zero problems with Ubuntu or Plesk since then. We did exactly the same on Ubuntu 18.04 previously which gave exactly the same results. All servers have different setups though, so your own experience may differ of course. The Ubuntu 5.10.* and 5.11.* stable kernels can be utilised via a manual upgrade process but we haven't taken that step ourselves so far.
 
If Plesk is installed on a hardware server, the kernel updates are recommended if there are only vendor's repositories configured. Otherwise, if the custom repositories provide new kernels, it is better to have the kernel manually updated from the vendor's repository. The reason is simple: major troubles are caused by kernels with GRSecurity patches applied. Plesk is not designed for working with such configurations.
 
.....major troubles are caused by kernels with GRSecurity patches applied...
AFAIK all Official Ubuntu Kernels (shown here on Ubuntu to Mainline kernel version mapping) are released without any GRSecurity patches being present.

Quite correct that if they wanted to, people can regularly apply GRS patches themselves, via custom repositories and/or by applying their own config variations onto any Ubuntu Kernel(s) that they are using, but it's not a simple exercise to do that, as GRS was/is initially, specifically aimed at Debian anyway wasn't it?

We don't use GRS & never have. All of our Ubuntu HWE kernels / kernel updates, are indeed official Ubuntu updates from official Ubuntu repositories.
 
Back
Top