Error installing CA_API_PlatformUpdate_64bit_v9.3.00-RHEL

book

Article ID: 196253

calendar_today

Updated On:

Products

CA API Gateway API SECURITY CA API Gateway Precision API Monitoring Module for API Gateway (Layer 7) CA API Gateway Enterprise Service Manager (Layer 7) STARTER PACK-7 CA Microgateway

Issue/Introduction

Installing  CA_API_PlatformUpdate_64bit_v9.3.00-RHEL shows Error :

2020-07-29T13:07:35.061-0500 INFO    18 com.l7tech.server.processcontroller.patching.PatchServiceApiImpl: Output from patch install: Preparing...                ##################################################
2020-07-29T13:07:35.061-0500 INFO    18 com.l7tech.server.processcontroller.patching.PatchServiceApiImpl: Output from patch install:    package kernel-firmware-2.6.32-754.30.2.el6.noarch (which is newer than kernel-firmware-2.6.32-696.16.1.el6.noarch) is already installed
2020-07-29T13:07:35.061-0500 INFO    18 com.l7tech.server.processcontroller.patching.PatchServiceApiImpl: Output from patch install:    package kernel-2.6.32-754.30.2.el6.x86_64 (which is newer than kernel-2.6.32-696.16.1.el6.x86_64) is already installed
2020-07-29T13:07:35.067-0500 INFO    18 com.l7tech.server.processcontroller.patching.PatchServiceApiImpl: Output from patch install: ERROR      : failed to update operating system RPMs
2020-07-29T13:07:35.070-0500 INFO    18 com.l7tech.server.processcontroller.patching.PatchServiceApiImpl: Output from patch install: Error installing patch: Error executing patch task: non-zero exit code returned from patch install script (returned 1)

 

Cause

there was wrong sequence patch installation 

Environment

Release : 9.2

Component : API GATEWAY

Resolution

The suggested method for this error is to apply this first :

CA_API_PlatformUpdate_64bit_vKernel-2018-10-05.L7P

https://support.broadcom.com/external/content/release-announcements/CA-API-Gateway-Solutions--Patches/3024

Then re-apply the patch CA_API_PlatformUpdate_64bit_v9.3.00-RHEL.

Note:  We do not Advised  to remove the kernel manually, we have seen removing the kernel causes future issues and its not recommended.

Additional Information

This is the patch installation sequency
From 9.2 to 9.4 CR04 + Monthly

Patches to Download from 
https://support.broadcom.com/external/content/release-announcements/CA-API-Gateway-Solutions--Patches/3024

1) Do a VMware Snapshot of your Gateway before Upgrading. Work with your VMware Administrator on performing a snapshot of your Gateway in case you need to revert if there is an issue 
2) Check your current version. Do this to verify the version you are upgrading from and ensure you are following the right path
3) Disable Enterprise Service Manager (ESM) if present. Do this only if you are running ESM
4) Upgrade Thales HSM Firmware if present. Do this only if your CA API Gateway includes a Thales Hardware Security Module (HSM)
5) Remove Old WebSocket Components if present. If your Gateway contains any WebSocket components from v9.1 or earlier, delete these components before upgrading
6) CA_API_PlatformUpdate_64bit_vKernel-2018-10-05.L7P, File Name : CA_API_PlatformUpdate_64bit_vKernel-2018-10-05.L7P
7) ** CA_API_PlatformUpdate_64bit_v9.3.00-RHEL.L7P , File Name : CA_API_Gateway_v9.3.00_Upgrade_Patches_RHEL.zip ***
8) CA_API_PlatformUpdate_64bit_v9.4.00-RHEL.L7P , File Name : CA API_Gateway_v9.4.00_Upgrade_Patches_RHEL.zip
9)CA_API_Gateway_v9.4.00.L7P, File Name : CA API_Gateway_v9.4.00_Upgrade_Patches_RHEL.zip
10) Upgrade MySQL Database from Gateway Menu . If you see any mysql warning messages after the upgrade, execute the mysql_upgrade
11) CA_API_Gateway_v9.4.00.10242-CR04.L7P,File Name : CA_API_Gateway_v9.4.00-CR04.zip
12) Monthly Vulnerability Patch , File Name : CA_API_PlatformUpdate_64bit_v9.X-RHEL-2020-01-23.L7P
13) CA API Gateway Policy Manager 9.4.00.10242-CR04 Installer.exe, File Name : CA_API_Gateway_v9.4.00-CR04.zip
14) CA_SSO_SDK_Compact_v12.52.01.09.L7P , File Name : CA API_Gateway_v9.4.00_Upgrade_Patches_RHEL.zip , Only Apply CA_SSO_SDK_Compact_v12.52.01.09.L7P if running CA Single Sign On Integration otherwise ignore this patch