Bug 2173767

Summary: Software Updates still show applicable on the customer portal after applying them to Satellite server
Product: Red Hat Satellite Reporter: Benjamin Kielhold <bkielhol>
Component: Foreman MaintainAssignee: satellite6-bugs <satellite6-bugs>
Status: NEW --- QA Contact: Satellite QE Team <sat-qe-bz-list>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 6.12.0CC: ahumbe, ehelms
Target Milestone: UnspecifiedKeywords: Triaged
Target Release: Unused   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
Attachment shows an example of an advisory (RHSA-2023:0832) still needing to be installed/applied to the server none

Description Benjamin Kielhold 2023-02-27 22:27:32 UTC
Created attachment 1946793 [details]
Attachment shows an example of an advisory (RHSA-2023:0832) still needing to be installed/applied to the server

Greetings,

Description of problem:
----
After updating packages for Satellite server using `satellite-maintain packages update`, applicable `Software Updates` are still present at access.redhat.com/management/systems/<UUID> even after waiting 4 hours to 24 hours and forcing the server to checkin via the guidance provided on the page.

Executing, `yum updateinfo list security --installed` on the server will show that the security advisories have been applied yet are still referenced needing to be applied on access.redhat.com/management/systems/<UUID> .


Version-Release number of selected component (if applicable):
----
Candlepin: candlepin-4.1.19-1.el8sat.noarch
Satellite: satellite-6.12.2-1.el8sat.noarch


How reproducible:
100%

Steps to Reproduce:
1. Access access.redhat.com/management/systems/<UUID> for the server that has applicable software updates and view what is ready and waiting to be installed.

2. Install those applicable updates -- Ex:`satellite-maintain packages update`

3. Force a checkin using the recommended way shown via the "?" next to `Software Updates` text. Link: https://access.redhat.com/solutions/3210391

 ~~~
   If the RHEL version 7.7 or greater, 
    # rm -f /var/lib/rhsm/cache/profile.json
    # systemctl stop rhsmcertd 
    # rhsmcertd --now
 ~~~

and wait 4 hours or more per the guidance.

4. Once again view access.redhat.com/management/systems/<UUID> and see the applicable installs still available.

5. Execute, `yum updateinfo list security --installed` and compare to verify that the software was installed.


Actual results:
----
[root@satellite612]# yum updateinfo list security --installed -v | grep "RHSA-2023:0832"
RHSA-2023:0832 Important/Sec. kernel-4.18.0-425.13.1.el8_7.x86_64                                                 2023-02-21 03:46:19
RHSA-2023:0832 Important/Sec. kernel-core-4.18.0-425.13.1.el8_7.x86_64                                            2023-02-21 03:46:19
RHSA-2023:0832 Important/Sec. kernel-headers-4.18.0-425.13.1.el8_7.x86_64                                         2023-02-21 03:46:19
RHSA-2023:0832 Important/Sec. kernel-modules-4.18.0-425.13.1.el8_7.x86_64                                         2023-02-21 03:46:19
RHSA-2023:0832 Important/Sec. kernel-modules-extra-4.18.0-425.13.1.el8_7.x86_64                                   2023-02-21 03:46:19
RHSA-2023:0832 Important/Sec. kernel-tools-4.18.0-425.13.1.el8_7.x86_64                                           2023-02-21 03:46:19
RHSA-2023:0832 Important/Sec. kernel-tools-libs-4.18.0-425.13.1.el8_7.x86_64                                      2023-02-21 03:46:19
RHSA-2023:0832 Important/Sec. python3-perf-4.18.0-425.13.1.el8_7.x86_64                                           2023-02-21 03:46:19

[root@satellite612] # uname -r
4.18.0-425.13.1.el8_7.x86_64

See Attachment, `ExampleApplicable.png` showing that the above is still needing to be applied. See the last checkin day as Feb 27th for the server used in example and the install date was 2023-02-21.

[root@satellite612] # yum updateinfo list updates security | grep "RHSA-2023:0832"
              
  The above command returns nothing needing to be applied.


Expected results:
----

 After the server checks in, expected result would be that it would correctly be reflected what software updates were needing to be applied. 

Respectfully,
Benjamin Kielhold