CSP-96928: Patch instructions to upgrade Photon-OS Library, Tomcat template, and RabbitMQ server
book
Article ID: 377094
calendar_today
Updated On:
Products
VMware Aria Suite
Issue/Introduction
Patch Superseded
This patch (CSP-96928) has been superseded and is no longer available. Please install the latest cumulative update, CSP-102092, by following the instructions in KB 412021.
Vulnerabilities Addressed by This (Superseded) Patch
This article provides information on a previous patch (CSP-96928) that upgraded the Photon OS library, Tomcat, and RabbitMQ server to fix the security vulnerabilities listed below.
It is recommended to upgrade instances of unsupported versions to newer, supported versions first before applying the patch. This procedure will not work for other versions. Please refer to the Broadcom Lifecycle Matrix for the list of supported versions of the product.
It is strongly recommended to take a snapshot or backup of the Appliance(s) and the database server before applying the procedure.
Verify the permission of /usr/local/horizon/conf/flags folder, it should be 777 for the patch to apply successfully.
Please apply the latest patch (CSP-99024-Appliance-3.3.7) or Follow the below steps post application of the patch if the latest patch could not be applied.
Check current rabbimq version and feature flag settings by commands below:
/usr/lib/rabbitmq/lib/rabbitmq_server-<version>/sbin/rabbitmqctl version /usr/lib/rabbitmq/lib/rabbitmq_server-<version>/sbin/rabbitmqctl list_feature_flags
If the rabbitmq version is prior to (not including) 3.11.x and feature flags are disabled, all features flags should be set to enabledbefore patch installation, in which rabbitmq 3.11.18 is inclused.
"If the feature flags are not enabled, RabbitMQ 3.11.0+ will refuse to start."
So commands below should be executed to enable all features flags then validate the settings:
/usr/lib/rabbitmq/lib/rabbitmq_server-<version>/sbin/rabbitmqctl enable_feature_flag all /usr/lib/rabbitmq/lib/rabbitmq_server-<version>/sbin/rabbitmqctl list_feature_flags
The result should be as below, all flags are enabled:
Download and transfer CSP-96928-Appliance-3.3.7.zip to the virtual appliance. This zip file can be saved anywhere on the file system. Broadcom recommends SCP protocol to transfer the file to the appliance. Tools such as Winscp can also be used to transfer the file to the appliance.
Unzip the file using the command below. unzip CSP-96928-Appliance-3.3.7.zip -d CSP-96928-Appliance-3.3.7
Navigate to the files within the unzipped folder using the command below. cd CSP-96928-Appliance-3.3.7.zip
Run the patch script using the below command ./CSP-96928-applyPatch.sh
In the case of vIDM 3 node Cluster, if the LCM version is less than 8.14.0 and the cluster seems down after the patch deployment, the user will have to follow the KB (https://knowledge.broadcom.com/external/article/367175) after application of the patch on all the 3 nodes.
Note: If you are running a cluster deployment, repeat the steps above on all additional nodes of the cluster.
Patch Deployment Validations:
After the patch deployment, perform the below steps to confirm the patch has been applied successfully
Login as an Administrator to the VIDM Console and verify the System Diagnostics page is green.
If the patch is applied successfully you can find a flag file created as CSP-96928-3.3.7-hotfix.applied in the /usr/local/horizon/conf/flags directory.
Login as a local administrator into the Service and navigate to the Legacy Connector page. Click on the Worker link and check whether the auth adapters load under the "Auth Adapters" tab. Click on any Enabled auth adapter and check if the page opens correctly.
Perform Directory Sync to validate users/groups are synced.
Check in the UI portal, if all tabs open properly, including the cfg page https://<vidm-hostname>:8443
Check the Admin Portal and the Connectors page shows the version as "3.3.7.0 Build 23103647"
Note:
If you are running a cluster deployment, repeat the steps above on all additional nodes of the cluster.
Patch application should be sequential i.e Primary -> Secondary -> Secondary Nodes
User needs to run Remediate action from LCM on the vIDM cluster if vRLCM version is 8.12.0 and below
For vRLCM version 8.14.0 and above, Auto recovery would take care of the cluster health on reboot.
This is a cumulative patch and this will perform an installation of other patches including CSP-95247, CSP-93316, CSP-91401, CSP-90495, HW-189454, and HW-170932.
Related Information:
To revert this patch, you can revert to the appliance(s) snapshot and the database backup taken before applying these steps.