Chris, I recommend you look into: - Spacewalk: Centralized system management utility ( http://spacewalk.redhat.com/) - Errata update tool: https://github.com/mike-wendt/spacewalk-centos-errata - CentOS repos do not include the errata information in the repo itself (EPEL does include errata info in its repos), so others have created external tools that pull errata off of the mailing lists. Combined, they would allow you to have a local mirror of the CentOS repos and push/pull only the packages you want to install. Bill On Tue, Dec 15, 2015 at 6:12 AM, Chris <contact@xxxxxxxxxx> wrote: > Hello, > > > > I'm looking for a solution to automatically yum update security relevant > packages on a couple hundred Centos6/7 servers. The deployment/trigger > would > be Ansible. > > I looked into the "yum-plugin-security" and tested it on a CentOS 6 > installation but always found no security relevant updates (yum > list-security/yum --security update) where there should be at least a > couple > ones. I read around it and found that this solution is not working for > CentOS (can you please confirm). What is the best practice to upgrade > security relevant packages on live systems without service interruption? > > > > Thanks in advance! > > > > Cheers, > > Chris > > _______________________________________________ > CentOS mailing list > CentOS@xxxxxxxxxx > https://lists.centos.org/mailman/listinfo/centos > _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx https://lists.centos.org/mailman/listinfo/centos