Reminder: Prepare Now for End of Red Hat Enterprise Linux 6 and 7 Support | Information Technology | University of Pittsburgh
!

You are here

Reminder: Prepare Now for End of Red Hat Enterprise Linux 6 and 7 Support

Thursday, March 14, 2024 - 16:23

 

As we communicated last summer, Red Hat is ending support for Red Hat Enterprise Linux versions 6 and 7 on June 30, 2024. Servers running Red Hat Enterprise Linux 6 and 7 will no longer be supported or receive security updates and bug fixes after this date, leaving them vulnerable to hackers, malware, and viruses.

If you have not yet done so, Pitt Information Technology encourages you to evaluate alternative server or hosting solutions and develop a plan to migrate from servers running Red Hat Enterprise Linux 6 and 7.

In-Place Server Upgrades Now Available

Pitt IT is pleased to share that we have developed an in-place upgrade process for Red Hat Enterprise Linux 6 and 7 servers hosted at the University Data Center. An in-place upgrade requires less work from department server administrators than a complete server rebuild because it retains all server files, software installations, and configuration settings. In addition, an in-place upgrade enables departments with development servers to test the upgrade before it is implemented in production.

An in-place upgrade typically requires four hours of server downtime. Pitt IT can work with your department to schedule upgrades during weekend and overnight maintenance periods to minimize downtime for your faculty and staff.

Pitt IT can also perform a complete server rebuild for departments with servers hosted at the Data Center who would prefer that option.

Next Steps

Please review the use cases for your Red Hat Enterprise Linux 6 and 7 servers and reach out to third-party application vendors to determine compatibility with current operating systems.

Pitt IT is available to provide support and assistance. Please contact the 24/7 IT Help Desk at +1-412-624-HELP (4357) or your Pitt IT Customer Success representative if you would like to discuss an in-place upgrade or other options to mitigate this pending vulnerability.