Upgrade > Preparing for SA upgrade > Core parameter values required for upgrade

Core parameter values required for upgrade

The following table lists the core parameters that require values during upgrade whether specified manually or taken from an existing CDF.

Required upgrade parameter values

Parameter

How to find the current value

cast.admin_pwd

This parameter specifies the password for the SA Admin user. To verify that you have the correct value, log in to the SA Client as the Admin user.

decrypt_passwd

This parameter contains the password to decrypt the database of crypto material. The value for this parameter does not change after installing SA.

truth.dcId

Log in to the SA Client, select the Administration tab, then select Facilities. Select the facility you are upgrading to see its ID number.

truth.dcNm

The Facility’s short name. Log in to the SA Client, select the Administration tab, then select Facilities. Select the facility you are upgrading to see its short name.

truth.dcSubDom

Log into the SA Client, select the Administration tab, select System Configuration in the navigation panel, and then select the facility you are upgrading; look up the value for opsware.core.domain.

truth.gcPwd

The password for the Oracle gcadmin user. To verify that you have the correct value, log in to the Model Repository (truth) as the gcadmin user using this password. The Oracle gcadmin user does not have permission to log in to Oracle. If you have entered the correct password, the following message appears:

ORA-01045: user GCADMIN lacks CREATE SESSION privilege; logon denied

If you have entered an incorrect password, the following message appears:

ORA-01017: invalid username/password; logon denied

truth.lcrepPwd

The password for the Oracle lcrep user. To verify that you have the correct value, log in to the Model Repository (truth) as lcrep using this password. The Oracle lcrep user does not have permission to log in to Oracle.

If you have entered the correct password, the following message appears:

ORA-01045: user LCREP lacks CREATE SESSION privilege; logon denied

If you have entered an incorrect password, the following message appears:

ORA-01017: invalid username/password; logon denied

truth.oaPwd

The password for the Oracle opsware_admin user. To verify that you have the correct value, log in to the Model Repository (truth) as
opsware_admin with this password.

db.orahome

The path for ORACLE_HOME. Log on to the server hosting the Model Repository (truth) and enter the following command:

su - oracle
echo $ORACLE_HOME

truth.pubViewsPwd

The value for this parameter does not change after installing SA. The value should be correct in the response file.

truth.servicename

This parameter contains the tnsname of the Model Repository (truth). Check
/var/opt/oracle/tnsnames.ora on the server hosting the Model Repository (truth) to find the value.

For example, if the file contains an entry similar to this:

devtruthac03 = (DESCRIPTION=(ADDRESS=
(HOST=truth.XXX.dev.example.com)(PORT=1521) (PROTOCOL=tcp))(CONNECT_DATA= (SERVICE_NAME=truth)))

then, the servicename is devtruthac03.

truth.sourcePath

This parameter must point to an existing directory.

truth.spinPwd

The password for the Oracle spin user. To verify that you have the correct value, log in to the Model Repository (truth) as spin using this password

truth.tnsdir

The directory in which the tnsnames.ora file is located. Typically, this file is stored in the directory /var/opt/oracle.

truth.aaaPwd

The password for the Oracle aaa user. To verify that you have the correct value, log in to the Model Repository (truth) database as user aaa using this password. The Oracle aaa user does not have permission to log in to Oracle.

If you have entered the correct password, the following message appears:

ORA-01045: user AAA lacks CREATE SESSION privilege; logon denied

If you have entered an incorrect password, the following message appears:

ORA-01017: invalid username/ password; logon denied

truth.truthPwd

The password for the Oracle truth user. To verify that you have the correct value, log in to the Model Repository (truth) as truth using this password. The Oracle truth user does not have permission to log in to Oracle.

If you have entered the correct password, the following message appears:

ORA-01045: user TRUTH lacks CREATE SESSION privilege; logon denied

If you have entered an incorrect password, the following message appears:

ORA-01017: invalid username/password; logon denied

truth.twistPwd

The password for the Oracle twist user. To verify that you have the correct value, log in to the Model Repository (truth) as twist using this password.

truth.vaultPwd

The password for the Oracle vault user. To verify that you have the correct value, log in to the Model Repository (truth) as vault using this password. This parameter is only relevant to Multimaster Cores.

twist.buildmgr.passwd

On the server where the OS Provisioning Build Manager component is installed, check the file:

/var/opt/opsware/crypto/buildmgr/twist.passwd

twist.integration.passwd

On the server where the SA Client component is installed, check the file
/opt/opsware/twist/Defa...

In the file, locate the entry for the Integration password by searching for uid=integration,ou=people and note the userpassword attribute.

twist.min_uid

Does not change from installation.

media_server.linux_media

The location of your Linux OS media. Check the server where the OS Provisioning Media Server component is installed. Because this media is NFS exported, you can check the /etc/exports file (Linux).

media_server.sunos_media

The location of your Solaris OS media. Check the server where the OS Provisioning Media Server component is installed. Because this media is NFS exported, you can check the /etc/exports file (Linux) or the /etc/dfs/dfstab file (Solaris).

media_server.windows_media

The location of your Windows OS media. Check the server where the OS Provisioning Media Server component is installed. Check the file to see what this value is set to.

/etc/opt/opsware/samba/smb.conf

media_server.windows_share_name

On the server where the OS Provisioning Media Server component is installed, see the file:

/opt/OPSWsamba/etc/smb.conf

for the value.

media_server.windows_share_password

This password is only used when importing Windows OS media; it is not used internally by SA.

You cannot recover or validate the current Windows share password; however, you can set it or reset it during the upgrade.

boot_server.buildmgr_host

Log in to the SA Client, click Administration in the Navigation panel, expand System Configuration, select Service Levels Members and then OS Build Manager. The members are displayed in the right window.

boot_server.speed_duplex

On the server hosting the OS Provisioning Boot Server, check the file
/opt/OPSWboot/jumpstart/Boot
/etc/.speed_duplex.state

db.sid

On the server hosting the Model Repository (truth), check the tnsnames.ora file; for example, if the file contains an entry similar to this:

devtruthac03 = (DESCRIPTION=(ADDRESS=
(HOST=truth.XXX.dev.example.com)(PORT=1521)
(PROTOCOL=tcp))(CONNECT_DATA=
(SERVICE_NAME=truth)))

then, the SID for the Model Repository is truth.

db.port

Port on which the database host is being monitored and accepts connections.

agent_gw_list_args

This value is required only when upgrading a Satellite.

Obtain this value from the Gateway Properties file on the server hosting the Core Gateway.

In the properties file, locate the values for the following parameters:

--GWAddress
the IP address of the server hosting the Core Gateway.

--ProxyPort
the port number used by Server Agents to communicate with the Core Gateway (port 3001 by default).

default_locale

Log in to the SA Client to determine which locale is being used by SA (the locale value is apparent from the SA Client UI).

ogfs.store.host.ip

Linux: on the server hosting the OGFS (Slice Component bundle), check the value in the
/etc/fstab file. The entry is specified as follows:

# Begin Global Filesystem mounts
<ogfs.store.host.ip>:<ogfs.store.path> /var/opt/OPSWmnt/store nfs
<ogfs.audit.host.ip>:<ogfs.audit.path> /var/opt/OPSWmnt/audit nfs
# End Global Filesystem mounts

ogfs.store.path

Linux: on the server hosting the OGFS (Slice Component bundle), check the value in the file
/etc/fstab. The entry is specified as follows:

# Begin Global Filesystem mounts
<ogfs.store.host.ip>:
<ogfs.store.path> /var/opt/OPSWmnt/store nfs
<ogfs.audit.host.ip>:<ogfs.audit.path> /var/opt/OPSWmnt/audit nfs
# End Global Filesystem mounts

ogfs.audit.host.ip

Linux: on the server hosting the OGFS (Slice Component bundle), check the value in the file
/etc/fstab. The entry is specified as follows:

# Begin Global Filesystem mounts
<ogfs.store.host.ip>:<ogfs.store.path> /var/opt/OPSWmnt/store nfs
<ogfs.audit.host.ip>:<ogfs.audit.path> /var/opt/OPSWmnt/audit nfs
# End Global Filesystem mounts

ogfs.audit.path

Linux: on the server hosting the OGFS (Slice Component bundle), check the value in the file
/etc/fstab. The entry is specified as follows:

# Begin Global Filesystem mounts
<ogfs.store.host.ip>:<ogfs.store.path> /var/opt/OPSWmnt/store nfs
<ogfs.audit.host.ip>:
<ogfs.audit.path> /var/opt/OPSWmnt/audit nfs
# End Global Filesystem mounts

windows_util_loc

The directory in which the Windows Patch Management utilities are located unless you choose not to install them. See Windows Patch Management utilities.

cgw_admin_port

On the server hosting the Core Gateway, check the files:

/etc/opt/opsware/opswgw-cgws-<truth.dcNm>/opswgw.properties

cgw_address

On the server hosting the Core Gateway, check the files:

/etc/opt/opsware/opswgw-cgws-<truth.dcNm>/opswgw.properties

cgw_proxy_port

On the server hosting the Core Gateway, check the files:

/etc/opt/opsware/opswgw-cgws-<truth.dcNm>/opswgw.properties

agw_proxy_port

On the server hosting the Core Gateway, check the files:

/etc/opt/opsware/opswgw-agws-<truth.dcNm>/opswgw.properties

cgw_slice_tunnel_listener_
port

On the server hosting the Core Gateway, check the files:

/etc/opt/opsware/opswgw-cgws-<truth.dcNm>/opswgw.properties

NOTE: The file might contain two entries for opswgw.TunnelDst. Use the value from the line that specifies opswgw.pem.

mgw_tunnel_listener_port

On the server hosting the Management Gateway, check the files:

/etc/opt/opsware/opswgw-mgws-<truth.dcNm>/opswgw.properties

masterCore.mgw_tunnel_
listener_port

On the server hosting the Management Gateway, check the files:

/etc/opt/opsware/opswgw-mgws-<truth.dcNm>/opswgw.properties

word_root

Does not change from installation.