Q300. What is zero downtime patching?
Answer:
Zero Downtime Patching is a technique of applying system or kernel patches without stopping services or affecting users, usually achieved through rolling updates, load balancing, or live kernel patching.
Zero Downtime Patching is a method of applying OS, kernel, or application patches to a system without stopping services and without impacting end users.
The goal is to keep the application available 24×7, even while maintenance is happening in the background.
In simple words:
👉 Users should not feel that patching is happening at all.
In real production environments:
Applications run 24×7
Downtime causes:
Business loss 💰
SLA violations
Customer dissatisfaction
Restarting servers for patching is not always acceptable
So organizations prefer Zero or Near-Zero downtime approaches.
Banking & Financial systems
E-commerce websites
Telecom applications
Cloud environments (AWS, Azure, GCP)
Large enterprise Linux servers
Zero downtime patching is achieved by avoiding single points of failure and shifting traffic during patching.
Common techniques include:
Multiple servers
Load balancers
Rolling updates
Live kernel patching
Servers are in a cluster
Traffic is handled by a load balancer
One server is patched at a time
Remove Server-1 from load balancer
Apply patches & reboot Server-1
Add Server-1 back to load balancer
Repeat for Server-2, Server-3, etc.
✅ Application stays online
❌ Individual servers may reboot
Used to apply kernel security patches without rebooting.
Examples:
kpatch (RHEL)
KernelCare
Oracle Ksplice
No reboot required
No service interruption
Critical for high-availability systems
⚠️ Limitation:
Only supports security fixes, not major kernel upgrades
One server is Active
One server is Passive (standby)
Switch traffic to Passive server
Patch Active server
Switch traffic back
Patch Passive server
Used in:
Databases
Legacy applications
Pods are recreated automatically
New patched containers replace old ones
Traffic is shifted automatically
Used in:
Microservices
Cloud-native applications
Ansible (automation)
Red Hat Satellite
AWS Systems Manager Patch Manager
Kubernetes Rolling Updates
Load Balancers (ALB, NLB, HAProxy)
✅ No service interruption
✅ Better customer experience
✅ Meets SLA requirements
✅ Improved system security
✅ Suitable for production environments
❌ More complex setup
❌ Requires multiple servers
❌ Higher infrastructure cost
❌ Not always possible for single-node systems
An e-commerce website runs on 3 RHEL servers behind a load balancer.
During patching:
One server is removed from traffic
OS patches are applied
Server is rebooted and tested
Added back to the load balancer
Users continue shopping without interruption.
Not a member yet? Register now
Are you a member? Login now