Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
Update and Restart CSA
The following tasks must be completed before CSA can be restarted:
- Recustomize SSL/security
- Import certificates into CSA's truststore
- Recustomize manually configured files
- Remount shared file systems
- Upgrade all organization's 5recentWidget mashup
- Restart the CSA Services
Recustomize SSL/Security
If you generated or copied SSL certificates that are used by CSA, you must copy these files to the appropriate directory in CSA 4.80.0002.
Note
If the automatically generated self-signed certificate for CSA has expired, you may still be able to use the Cloud Service Management Console. However, you will not be able to use the Marketplace Portal or Identity Management component unless you disable the strictSSL
attribute in the Marketplace Portal's configuration file. If SSL must be enabled, you can generate another self-signed certificate or a Certificate Authority-signed certificate. If you generate a new certificate, you MUST import that certificate into CSA's JRE. Refer to the Configure SSL for Client Browsers section in the Cloud Service Automation Configuration Guide for more information.
The following is a list of files that you may have customized for SSL/security and the actions required when you upgrade CSA:
File | Action |
---|---|
certificate files | Required. Manually copy certificate files that do not use the .crt extension that are used by CSA from the backup directory to the CSA 4.80.0002 directory (see table below for more information). |
cacerts | Required. |
Keystore file defined by the |
Required (if not using the default keystore file). Manually copy the custom keystore file back from the location outside of the Windows: %CSA_HOME% or the Linux: $CSA_HOME installation directory where you manually backed it up. |
standalone.xml |
Required (if not using the default keystore file). Manually copy the custom keystore file back from the location outside of the Windows:%CSA_HOME% ; or the Linux: $CSA_HOME installation directory where you manually backed it up. |
Files, Actions, and Locations
certificate files | |
---|---|
Action | Required. Manually copy certificate files that do not use the .crt extension that are used by CSA from the backup directory to the CSA 4.80.0002 directory. Files that use the .crt extension are automatically restored. If you saved .crt files in a different directory, you must manually copy these files back after upgrade. |
File Location in CSA 4.80.0002 |
Windows: Linux: |
Backed Up CSA 4.6x or 4.7x File Location in CSA 4.80.0002 |
Windows: Linux: |
cacerts | |
---|---|
Action | Required. <CSA_JRE_HOME> is the directory in which the JRE that is used by CSA is installed. |
File Location in CSA 4.80.0002 |
Windows: Linux: where |
Backed Up CSA 4.6x or 4.7x File Location in CSA 4.80.0002 | This file is not backed up. |
Keystore file defined by the certificate-key-file property of the connector attribute in standalone.xml |
|
---|---|
Action |
Required (if not using the default keystore file). Manually copy the keystore file back from the location outside of the Windows: If you are using the default keystore file (Windows: |
File Location in CSA 4.80.0002 |
The file and its location are determined by the value defined by Linux: |
Backed Up CSA 4.6x or 4.7x File Location in CSA 4.80.0002 |
If you are using a custom keystore file, this file is not backed up. The default keystore file is backed up to: Windows: Linux: |
standalone.xml | |
---|---|
Action | If this file was customized, manually copy the custom keystore file back from the location outside of the CSA installation directory where you manually backed it up. |
File Location in CSA 4.80.0002 |
Windows: Linux: |
Backed Up CSA 4.6x or 4.7x File Location in CSA 4.80.0002 |
Windows: Linux: Backup - Windows: |
Import Certificates into CSA's Truststore
Prior to running the upgrade installer, you should have exported the SSL certificate from the truststore of CSA version 4.6x or 4.7x. Import this certificate and other application's certificates into the truststore of CSA version 4.80.0002. Do the following:
-
If you did not export the SSL certificate from the truststore of CSA version 4.6x or 4.7x, the truststore has been backed up to the directory:
Windows:
%CSA_HOME%\_CSA_4_80_0_installation\Backup\security\keystores\
Linux:
$CSA_HOME/_CSA_4_80_0_installation/Backup/security/keystores/
Follow the instructions in the Initial Setup section of this document to export CSA's SSL certificate from the backed up truststore (you will need to modify the location of the truststore in the command).
-
Import the CSA certificate into the new CSA truststore. Do the following:
-
Run the following commands:
Windows:
<csa_jre>\bin\keytool ‑importcert ‑keystore <csa_jre>\lib\security\cacerts ‑alias <alias> ‑file <filename> ‑storepass changeit
%CSA_HOME%\openjre\bin\keytool ‑importcert ‑keystore %CSA_HOME%\openjre\lib\security\cacerts ‑alias <alias> ‑file <filename> ‑storepass changeit
Linux:
$CSA_JRE_HOME/bin/keytool ‑importcert ‑keystore $CSA_JRE_HOME/lib/security/cacerts ‑alias <alias> ‑file <filename> ‑storepass changeit
$CSA_HOME/openjre/bin/keytool ‑importcert ‑keystore $CSA_HOME/openjre/lib/security/cacerts ‑alias <alias> ‑file <filename> ‑storepass changeit
where
<CSA_JRE_HOME>
is the directory in which the JRE that is used by CSA is installed., <alias> is the name used by the CSA server keystore to identify the SSL certificate, and <file_name> is the filename given to the certificate file to be imported.For example, run the following command where the alias used to identify the certificate is
csa
, and the file the certificate is namedcsa.cert
and is saved in the current directory:Windows:
<csa_jre>\bin\keytool ‑importcert ‑keystore <csa_jre>\lib\security\cacerts ‑alias csa ‑file .\csa.cert ‑storepass changeit
%CSA_HOME%\openjre\bin\keytool ‑importcert ‑keystore <csa_jre>\openjre\lib\security\cacerts ‑alias csa ‑file .\csa.cert ‑storepass changeit
Linux:
$CSA_JRE_HOME/bin/keytool ‑importcert ‑keystore $CSA_HOME/lib/security/cacerts ‑alias csa ‑file ./csa.cert ‑storepass changeit
$CSA_HOME/openjre/bin/keytool ‑importcert ‑keystore $CSA_HOME/openjre/lib/security/cacerts ‑alias csa ‑file ./csa.cert ‑storepass changeit
- At the prompt to import the certificate, type yes.
-
-
Import the Operations Orchestration certificate into the new CSA truststore. Do the following:
-
If the root certificate of Operations Orchestration's Certificate Authority is stored in a file on this system, import that file. Otherwise, export Operations Orchestration's certificate from Operations Orchestration's truststore:
- On the system running Operations Orchestration,
open a command prompt and change the directory to
%ICONCLUDE_HOME%
(Windows) or$ICONCLUDE_HOME
(Linux). -
Run the following command:
Windows:
.\jre1.6\bin\keytool exportcert alias pas file C:\oo.crt keystore .\Central\conf\rc_keystore storepass bran507025
Linux:
./jre1.6/bin/keytool ‑exportcert ‑alias pas ‑file /tmp/oo.crt ‑keystore ./Central/conf/rc_keystore ‑storepass bran507025
where
C:\oo.crt
and/tmp/oo.crt
are examples of filenames and locations used to store the exported root certificate (you can choose a different filename and location). - If Operations Orchestration is not running on the same system as
CSA,
copy
oo.crt
from the Operations Orchestration system to the system running CSA (in this example, the file is copied to Windows:C:\
Linux:/tmp
).
- On the system running Operations Orchestration,
open a command prompt and change the directory to
-
On the system running CSA, run the following commands:
Windows:
<csa_jre>\bin\keytool ‑importcert ‑alias pas ‑file C:\oo.crt ‑keystore <csa_jre>\lib\security\cacerts ‑storepass changeit
%CSA_HOME%\openjre\bin\keytool ‑importcert ‑alias pas ‑file C:\oo.crt ‑keystore
%CSA_HOME%\openjre\lib\security\cacerts ‑storepass changeit
Linux:
$CSA_JRE_HOME/bin/keytool ‑importcert ‑alias pas ‑file /tmp/oo.crt ‑keystore $CSA_JRE_HOME/lib/security/cacerts ‑storepass changeit
$CSA_HOME/openjre/bin/keytool ‑importcert ‑alias pas ‑file /tmp/oo.crt ‑keystore
$CSA_HOME/openjre/lib/security/cacerts ‑storepass changeit
where
<CSA_JRE_HOME>
is the directory in which the JRE that is used by CSA is installed.
When prompted to trust the certificate, type yes.The manual certificate import procedure is mandatory, especially when one or more Operations Orchestration instances are used by CSA for sequence designs. These particular Operations Orchestration instances are not specified during the CSA installation or upgrade process.The import of any certificate used by an Operations Orchestration instance which was specified during installation is performed automatically by installer. -
-
If other applications, such as the database, LDAP, SMTP, Operations Orchestration Load Balancer, or Continuous Delivery Automation require SSL, and/or you have installed an instance of the Marketplace Portal on a remote system, you must import these applications' certificates into the truststore of CSA version 4.80.0002.
Recustomize Manually Configured Files
If you customized CSA files that are not documented as being customizable or customized CSA files with undocumented customizations, you will need to manually recustomize those files.
Caution
All files that you have customized with undocumented changes in the Windows: %CSA_HOME%
or the Linux: $CSA_HOME
installation directory MUST BE MANUALLY RESTORED. If you followed all the steps in the Initial Setup section of this guide, you should have backed up these files before upgrading CSA.
Remount Shared File Systems
If you unmounted one or more shared file systems within the CSA installation directory before running the upgrade installer, remount these file systems after the upgrade installer has completed.
Upgrade all Organization's 5recentWidget Mashup
For security purposes, you must manually update the 5recentWidget mashup and every copy of this mashup for every organization that existed prior to upgrade. Do the following:
- Log in to the Cloud Service Management Console as an administrator.
- Click Administration.
Create a temporary organization:
- In the left navigation frame, click the Create Organization button.
- Enter an organization name.
- Click Create.
Copy the content of the 5recentWidget mashup from the temporary organization:
- In the left navigation frame, select the temporary organization.
- In the organization's navigation frame, select Dashboard Widgets.
Select the 5recentWidget mashup and click edit.
Copy the text from the Content field.
For every organization (except the temporary organization you just created), do the following:
- Select the organization.
- In the organization's navigation frame, select Dashboard Widgets.
For the 5recentWidget mashup and every mashup that is a copy of the 5recentWidget mashup that has not been customized, do the following:
Select the mashup and click edit.
If you have not customized the 5recentWidget mashup, paste the content from the temporary organization's 5recentWidget mashup to this organization's 5recentWidget mashup. If you made a copy of the organization's 5recentWidget mashup but did not customize it, paste the contents from the temporary organization's 5recentWidget mashup to this mashup.
If you have customized the 5recentWidget mashup or made a copy of the 5recentWidget mashup and customized it, do the following:
- Locate the
render
function. - Locate every occurrence of
data[i].name
in the function and change every occurrence ofdata[i].name
to htmlEncode(data[i].name) (except variable declarations). In the uncustomized 5recentWidget mashup, this content appears three times, but only two occurrences need to be updated (do not update the variable declaration). Add the following functions to the mashup (the content can be copied from the temporary organization's 5recentWidget mashup):
function htmlEncode(value){
//create a in-memory div, set its inner text (which jQuery automatically encodes)
//then grab the encoded contents back out. The div never exists on the page.
return $('<div/>').text(value).html();
}
function htmlDecode(value){
return $('').html(value).text();
}
- Locate the
Click Update.
After you have updated all organizations, delete the temporary organization:
- In the left navigation frame, select the temporary organization.
- In the temporary organization's navigation frame, select General Information.
- Click Delete.
- In the Delete Organization? dialog, click Yes to delete the temporary organization.
Restart the CSA Services
To start CSA on Windows, complete the following steps:
If you have configured CSA to be FIPS 140-2 compliant, create a CSA encryption keystore password file. The name and location of this file must match the value configured for the
keystorePasswordFile
property in theCSA_HOME\jboss-as\standalone\deployments\csa.war\WEB-INF\classes\csa.properties
file.The password file must contain only the following content:
keystorePassword=<CSA encryption keystore password>
where
<CSA encryption keystore password>
is the CSA encryption keystore password in clear text.This file is automatically deleted when the HPE Cloud Service Automation service is started.
On the server that hosts CSA, navigate to Start > Administrative Tools > Services.
If global search is enabled, do the following:
Right-click on the Elasticsearch 1.6.1 service and select Restart.
Wait for the Elasticsearch 1.6.1 service to restart, then right-click on HPE Search Service and select Restart.
Note: if global search is disabled, skip this step.
Right-click on the CSA service and select Start.
Right-click on the HPE Marketplace Portal service and select Start.
If you installed an embedded Operations Orchestration instance, right-click on the HPE Operations Orchestration Central service and select Start.
To start CSA on Linux, complete the following steps:
On the server that hosts CSA, type the following:
service csa start
service mpp startRefer to the
csa.provider.es.exists
property in Appendix: Cloud Service Management Console Properties and type the following:service elasticsearch start
By default, elasticsearch is enabled.If you installed an embedded Operations Orchestration instance, type:
<embeddedHPEOOinstallation>/central/bin/central start
For example, type
/usr/local/hpe/csa/OO/central/bin/central start
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to clouddocs@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: