000035104 - Check for Errant YUM Repositories Before Updating RSA NetWitness or Security Analytics Appliances

Document created by RSA Customer Support Employee on May 25, 2017
Version 1Show Document
  • View in full screen mode

Article Content

Article Number000035104
Applies ToRSA Product Set: Security Analytics
RSA Product/Service Type: Core Appliance, Archiver, ESA, Malware, SA Server
RSA Version:  10.4.x, 10.5.x, 10.6.x
Platform: CentOS
O/S Version: EL6
IssueErrant or unwanted YUM repositories on appliances may result in unexpected errors during the upgrade process.  
To avoid this problem, logon to RSA NetWitness appliances or Security Analytics appliances prior to upgrading to execute a simple command to identify which, if any repositories are enabled, and disable unwanted repositories prior to initiating an upgrade.
ResolutionLogon to each RSA RSA Netwitness appliances or Security Analytics appliances via the console or an ssh session and run a simple command to identify YUM repositories that are enabled.
  1. Logon to the appliances as root.
  2. Execute the following command:
grep "enabled=1" /etc/yum.repos.d/*.repo

  1. Review the output of the command from step 2.  
Sample Output

[root@saserver ~]# grep "enabled=1" /etc/yum.repos.d/*.repo
[root@saserver ~]# grep "enabled=1" /etc/yum.repos.d/*.repo


In the sample output above, you see two examples showing the RSASoftware.repo and the sa.repo repositories are enabled.  These are normally the only two repositories that should be enabled on your RSA Netwitness or Security Analytics appliances.  On most appliances, only the RSASoftware.repo file is present.
The only repositories that should be enabled are RSASoftware.repo or sa.repo.  If you find any other repositories enabled please verify this is intended and do not proceed with the upgrade until you have verified the status of these repositories and disabled any repositories that you cannot confirm are intentional enabled.