Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
What's new in SA 10.50?
This section describes new functionality and other release-specific information.
Feature | Description |
---|---|
SA Client launcher improvements |
Authentication to the SA Core is now done in the SA Client, after the Launcher has downloaded the required files. The SA Client Launcher now accepts only one input from the user: the SA Core hostname/IP address. A new window appears, where you need to enter the SA username and password. For more information, see Server Automation. Java Web Start has been removed from the SA Client Launcher. The functional changes that resulted are as follows:
|
Windows operating systems supported on the SA Client |
Following is a list of operating systems supported on the SA Client:
|
New Linux Service operating system |
The new Linux Service operating systems provided with SA 10.50 is based on CentOS. Service OS (SOS) bits are not available for the PPC and IA processor architectures in the current distribution. In case of an upgrade, the existing RHEL IA and PPC Service OS bits will not be removed. The existing RHEL x86/x64 bits will be renamed, adding 'rpmsave' to the original name. Restore these bits by replacing the linux50/linux60/linux60x64 folder with rhel50rpmsave/rhel60rpmsave/rhel60x64rpmsave, at these paths: |
SE Linux support in SA |
SE Linux is supported in Permissive or Enforcing modes for RHEL 6.6. For more details, see SELinux security policy for SA Infrastructure |
New for SA Web Client |
The SA Web Client is now used for downloading the SA Client launcher. The Web Client can be accessed as before, by navigating to a slice IP address or hostname. It features a completely re-designed home page that contains the following:
The functionality that were previously available in SA Web Client can now be accessed from the SA Client as follows:
|
JBoss migration | From SA 10.50, the Application Server used by the Web Services Data Access Engine (Twist) component migrates from Weblogic to Wildfly (formerly known as JBoss). See Deprecation and end-of-support announcements for details on what is affected by this migration. |
New for audit and compliance |
A new optional element, preserveExceptions, is available in Audit Policy Filters. The element can be set to Yes or No. |
New for certificates |
Added CRL (Certificate Revocation List) support for access to SA using SA client with smart card authentication. |
New for localization |
SA 10.50 will be localized to Simplified Chinese, Japanese, German, Russian, French, and Spanish. |
New for OO-SA integration |
Updates pertaining specifically to the OO-SA integration (Server Automation operations performed within Operations Orchestration) are delivered via the HPE Live Network. |
New for Oracle database and model repository |
For changes to the Oracle Database and Model Repository, see Oracle setup for the model repository. |
SPARC provisioning |
SPARC servers can be provisioned now using OS Build Plans and not just OS Sequences. However, both the methods cannot be used at thOn RHEL 7.2, you must upgrade the system package at least to version 219-19.el7_2.4. Otherwise, the core services will not start automatically upon reboot. See errata for details. same time. The default configuration is the OS Build Plans provisioning mode. To ease the switch between the modes and dhcpd.conf configuration, use the following script:
When run, it will print the current provisioning mode for SPARC servers and request for your confirmation before switching the mode. If you continue, the script will backup the dhcpd.conf file, perform the required changes and restart the dhcpd service. |
Security features |
SA Client Session Inactivity is enabled and set by default to 30 minutes. This will lock the SA Java Client if you are idle for the specified period. You need to re-enter the password to unlock the SA Java Client. This setting will not be enforced when upgrading installations that have any custom settings applied under Administration > Users and Groups > Security Settings > Password Policy Settings. |
RHEL7 Core Platform |
SA can be installed on servers that are running Red Hat Enterprise Linux 7 (x86_64). On RHEL 7.2, you must upgrade the system package at least to version 219-19.el7_2.4. Otherwise, the core services will not start automatically upon reboot. See errata for details.
|
SA failover and High Availability |
The SA 10.50 Administration Guide provides information on how to achieve failover, server load balancing, and high availability in the SA environment. |
SA backup and restore best practices |
The SA Backup and Restore Best Practices white paper provides the best practices you can use to backup and restore SA with minimal data loss in a situation where SA has been adversely affected by data or power failures. |
New version of HPE Live Network Connector |
The Live Network Connector (LNc) that is installed on the SA core at: You need to download the latest version of LNc and install it on the core.
After installation is successful, LNc should work correctly. |
New for SA Agent
Feature | Description |
---|---|
Configured debugging |
Now you can configure debugging for ptymonitor through the ptymonitor.debug_name parameter in the agent's configuration file, agent.args. |
Disabled RC4 |
In this release, RC4 has been disabled for SSL encryption. |
Importing users |
The new custom attribute hpsa_preserve_solaris_user_home_path allows you to import users using your user-home path in /home/…. In previous SA versions, the import tool added /export to the path. To exclude the /export addition to the path, set the custom attribute to Managed Server. |
Changes made to the Agents installed on a non-system drive |
For agents installed on a non-system drive (a feature available from SA 10.21 for Windows platforms), the agent uninstaller removes symbolic links on the system drive and all agent files, except the target directory. |
Selecting PAPXs after Agent installation |
Using ADT (Agent Deployment Tool) you can select a maximum of 10 PAPXs to be run sequentially, after the agent is successfully installed. If one of the APX scripts fails, the system stops at that step, and does not run the remaining APXs, and reports the job as FAILED. In case of an error during the APX script run, the system will not roll back the currently or previously successfully run APXs.
This release includes three PAPXs for the following functionality:
|
New for patching
Feature | Description |
---|---|
Red Hat dynamic patching |
SA 10.50 adds support for Red Hat dynamic patching. Dynamic patch policies do not contain a list of policy items like their static counterpart, but apply the required updates to the managed servers based on the vendor recommendations. Dynamic patching offers better performance and scalability over static patching through software policies and it is the recommended way to keep your managed servers up-to-date. For more details, see Patch management for Red Hat Linux Enterprise. |
SA SUSE Manager Importer |
SA now offers a SUSE Manager Importer tool based on the SA RedHat Importer. The tool is capable of importing packages and errata from the SUSE Manager 2.1 Server and creating SA Software Policies for errata and packages hosted by SUSE Manager. For more information, see White Paper: SUSE Manager SLES Importer and the SA 10.50 Support and Compatibility Matrix. See Deprecation and end-of-support announcements for important SA Agent version deprecations and end-of-support announcements.
|
Red Hat Satellite 6.x support |
Modifications have been made to the HPE SA Red Hat Network (RHN) import tool to support content download from Red Hat content delivery network (CDN) using Red Hat subscription management (RHSM). This allows you to download content for Red Hat Enterprise Linux 7 (RHEL). For more information on how to set up and use the HPE SA Red Hat importer tool, see Using the Server Automation Red Hat Importer. |
New for OS provisioning
Feature | Description |
---|---|
New features |
|
Updates |
|
New platforms supported by build plans |
For more details on the newly supported platforms, see Addendum Provisioning Feature in the SA 10.50 Support and Compatibility Matrix. For all platforms, OS sequences are deprecated in SA 10.50 and later. The migration of any existing OS sequences to OS Build Plans for these platforms is strongly recommended. For more details about the new features, see SA Provisioning. |
New for software management
Feature | Description |
---|---|
RPM Rollback |
SA 10.50 introduces the RPM rollback functionality based on yum history, available for yum versions 3.2.25 or later. In previous releases, the RPM rollback functionality was only available on Linux servers where the installation was done using RPM versions 4.2 to 4.6, but the upstream feature was discontinued. For more details, see Software management. |
Unit history |
Starting with SA 10.50, all changes made to the units in the SA Library can be tracked using the new History element. The logged information includes name, description, platforms, location, install path, scripts, and flags. |
Timeout handling for remediation and installation jobs |
Server Automation now offers improved timeout handling for remediation and installation jobs. After a timeout occurs and until the job execution stops, the status of the server is changed to Stopping. While in the Stopping state, the agent does not take on any additional jobs and completes any job that is currently in progress. Moreover, if the timeout occurs during an agent reboot, then after restarting, the agent will not resume the job. After the job execution stops, the server will be marked as Timed Out. This fixes the discrepancy of the core showing the job as Failed because of a timeout, while the agent is performing the job. |
Job enhancements |
Software remediation jobs now support a secondary expansion mode (“At runtime”) for device groups, software policies, and patch policies. This way, when a remediation job is scheduled to run in the future, the device groups, software policies, or patch policies are expanded when the job is started, compared to previous releases where the expansion was done at the time the job was created. |
Security and Third-Party upgrades
Feature | Description |
---|---|
TLS compliance |
According to PCI DSS v3.1 standard, any cryptographic protocol lower than TLSv1.1 is considered weak. Starting with 10.50 release, SA allows protocol selection (possible values: TLSv1, TLSv1.1, TLSv1.2). For more details, see Securing SA internal communications and SA 10.5 upgrade |
New upgraded Third-Party product |
Python upgraded from Python 2.7.3 to Python 2.7.10. |
Installation enhancements
Feature | Description | ||
---|---|---|---|
Install/Upgrade SA 10.50 as users with root capabilities | |||
Changes made when adding a new core |
Adding a new (secondary) core to a mesh is performed in two stages, as before:
The following changes were done in the process of adding a new core:
|
||
New users supported by the SA installer |
User Name |
Machine Type |
Description |
root user |
Local |
A root user |
|
regular user |
Local |
A regular user who has permissions to invoke commands as root with sudo capabilities. When you use a regular user for performing the installation or rollback of a core patch, make sure you invoke the command using sudo.
For example: sudo <distro>/ opsware_installer/hpsa_install.sh |
|
root user |
Remote |
A root user, including root ssh access |
|
regular user |
Remote |
A regular user with sudo capabilities (including user ssh access) Password-less sudo is not supported for regular users with sudo capabilities.
|
|
New optional parameters for the enable_ipv6.sh script |
There are two new optional parameters for the enable_ipv6.sh script:
|
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to hpe_sa_docs@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: