• themoonisacheese@sh.itjust.works
    link
    fedilink
    arrow-up
    32
    ·
    21 hours ago

    Jesus Christ.

    I’ve been doing linux admin and honestly I haven’t been looking back. My breaking point was Microsoft pushing a kb that rebooted domain controllers for no reason.

    • nicky7@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      10 hours ago

      I’m shopping for an MSP that is Linux-centric. 70 workstations and a handful of servers but I will drop MS in a heartbeat if I had the right support to fall back on.

    • superkret@feddit.org
      link
      fedilink
      arrow-up
      25
      ·
      edit-2
      21 hours ago

      I still remember the update that sent domain controllers into a bootloop.
      That was fun!

      And the one that bluescreened all Windows servers.
      No, the other one!

      Oh, and the one that did an in-place-upgrade by itself, then locked your server cause it wasn’t licensed for the new OS version.

      • themoonisacheese@sh.itjust.works
        link
        fedilink
        arrow-up
        8
        ·
        20 hours ago

        I love how this doesn’t even begin to cover bad kbs ms pushed out. The fact that windows admins think testing updates before deploying them is a routine operation that should always be done boggles my mind.

      • lud@lemm.ee
        link
        fedilink
        arrow-up
        4
        ·
        20 hours ago

        Oh, and the one that did an in-place-upgrade by itself, then locked your server cause it wasn’t licensed for the new OS version.

        Wasn’t that primarily an issue with a third party software? And the server shouldn’t be locked by now since I believe you get a trial period of a few months. Our servers didn’t upgrade to 2025 but we use WSUS.

        Or are you talking about something older?

        • superkret@feddit.org
          link
          fedilink
          arrow-up
          9
          ·
          edit-2
          20 hours ago

          The third party software did exactly what it was designed to do:
          Push security updates automatically, while holding back feature updates for testing.
          This is standard operating procedure. Security updates are not supposed to change anything about how a server works, so the risk of breakage is very low.
          And they need to be installed as fast as possible, to patch holes that are now known to every attacker.

          Microsoft were the ones who pushed out a new Server OS installation and labelled it as security update.