Backporting security fixes to legacy software shouldn’t feel like defusing a time bomb. Yet, without the right tools, one wrong patch can break dependencies, delay releases, and leave systems vulnerable. What if you could automate the entire workflow—from CVE detection to stable RPM builds—while sleeping soundly at night?
In this talk, I’ll share battle-tested strategies for maintaining enterprise-grade software using open-source automation. Drawing from real-world experience maintaining long-term supported (LTS) systems, you’ll learn how to:
* Automate backporting workflows with Ansible playbooks and Event-Driven Ansible (EDA) to respond to CVEs faster.
* Design resilient RPM spec files that minimize manual patching (with coding examples).
* Ansible EDA in Action: Trigger automated backporting tasks when new CVEs are detected
* RPM Packaging Deep Dive: Use rpmbuild macros and modular spec files to future-proof packages