Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
Server Automation version history
The following table lists the new features, enhancements, and fixed defects introduced in previous SA 10.x releases.
Feature | Area | Description | Introduced in version |
---|---|---|---|
Migration to OpenJDK | Oracle JDK has been migrated to OpenJDK. Now, SA will run its Cores and Clients using OpenJDK. | 10.51 | |
Integration with Windows Server Update Services (WSUS) | Patch management |
SA can now connect to a WSUS server on your network to retrieve Microsoft patches from a central Windows patching repository. This adds an alternative workflow to the standard way of importing Windows patches from HPELN and Microsoft's offline catalog of updates. For tightly secured environments that cannot access the internet, switch SA to the new WSUS patching mode to pull in Windows updates from a custom WSUS repository in your network. The new WSUS patching option is available under Patch Administration > Patch settings and it connects SA to a Web service that you deploy on the WSUS machine. The SA-WSUS Web service connection supports both HTTP and HTTPS requests. Your selected patching mode applies to all the managed servers in the SA mesh. This means that you cannot target only specific servers for WSUS patching and keep others under Offline Catalog patching. Note The populate-opsware-update-library and the live-network-connector scripts are still specific to Microsoft Offline Catalog patching and do not run in WSUS patching mode. For more information on the WSUS patching mode, see Importing the Windows patch database from WSUS in the SA |
10.51 |
SELinux support for RHEL 6.8 and RHEL 7.x | Managed Platform Support/OS Systems Support | SA Agents running on RHEL 7.x managed servers now integrate with Systemd service. To use SA SELinux policies on RHEL 6.8 and RHEL 7.x managed servers, update the SA Agent to the 10.51 version.
SA Agents using Systemd benefit from separate Start/Stop commands. For more information, see Starting and stopping the SA Agent in the SA |
10.51 |
Windows operating systems supported on the SA Client | Managed Platform Support/OS Systems Support |
Following operating systems are supported on the SA Client.
|
10.50 |
New Linux Service operating system |
The new Linux Service OSs provided with SA 10.50 is based on CentOS. Service OS (SOS) bits are not available for the PPC and IA processor architectures in the current distribution. In case of an upgrade, the existing RHEL IA and PPC Service OS bits will not be removed. The existing RHEL x86/x64 bits will be renamed, adding 'rpmsave' to the original name. If you want to reuse these bits, restoration can be performed by replacing the linux50/linux60/linux60x64 folder with rhel50rpmsave/rhel60rpmsave/rhel60x64rpmsave, at this path: /opt/opsware/boot/tftpboot/ and /opt/opsware/boot/kickstart/. If you are performing a new installation, there will be no Linux Service OS for these two processor architectures. SE Linux is supported in Permissive or Enforcing modes for RHEL 6.6. F |
10.50 | |
Configured debugging | Agent | You can configure debugging for ptymonitor through the ptymonitor.debug_name parameter in the agent's configuration file, agent.args. | 10.50 |
Disabled RC4 | RC4 has been disabled for SSL encryption. | 10.50 | |
Importing users |
The new custom attribute hpsa_preserve_solaris_user_home_path allows you to import users using your user-home path in /home/…. In previous SA versions, the import tool added /export to the path. To exclude the /export addition to the path, set the custom attribute to managed server. |
10.50 | |
Changes made to the Agents installed on a non-system drive | For agents installed on a non-system drive (a feature available from SA 10.21 for Windows platforms), the agent uninstaller removes symbolic links on the system drive and all agent files, except the target directory. | 10.50 | |
Selecting PAPXs after Agent installation |
Using ADT (Agent Deployment Tool) you can select a maximum of 10 PAPXs to be run sequentially after the agent is successfully installed. If one of the APX scripts fails, the system stops at that step, and does not run the remaining APXs, and reports the job as FAILED. Three PAPXs are included for the following functionality:
|
10.50 | |
New features | OS provisioning |
|
10.50 |
Updates |
|
10.50 | |
New platforms supported by build plans |
For all platforms, OS Sequences are deprecated in SA 10.50 and later. The migration of any existing OS sequences to OS Build Plans for these platforms is strongly recommended. |
10.50 | |
RPM Rollback | Software Management | SA 10.50 introduces RPM rollback functionality based on yum history, available for yum versions 3.2.25 or later. In previous releases the RPM rollback functionality was only available on Linux servers where the installation was done using RPM versions 4.2 to 4.6, but the upstream feature was discontinued | 10.50 |
Unit history | Starting with SA 10.50, all changes made to the units in the SA Library can be tracked using the new History element. The logged information includes name, description, platforms, location, install path, scripts, and flags | 10.50 | |
Timeout handling for remediation and installation jobs |
Server Automation now offers improved timeout handling for remediation and installation jobs. After a timeout occurs and until the job execution stops, the status of the server is changed to Stopping. While in the Stopping state, the agent does not take on any additional jobs and completes any job that is currently in progress. Moreover, if the timeout occurs during an agent reboot, then after restarting, the agent will not resume the job. After the job execution stops, the server will be marked as Timed Out. This fixes the discrepancy of the core showing the job as Failed because of a timeout, while the agent is performing the job. |
10.50 | |
Job enhancements | Software remediation jobs now support a secondary expansion mode At runtime for device groups, software policies, and patch policies. This way, when a remediation job is scheduled to run in the future, the device groups, software policies, or patch policies are expanded when the job is started, compared to previagents installed on a non-systemous releases where the expansion was done at the time the job was created. | 10.50 | |
SPARC provisioning |
SPARC servers can be provisioned now using OS Build Plans and not just OS Sequences. However, both the methods cannot be used at the same time. The default configuration is the OS Build Plans provisioning mode. To ease the switch between modes and the dhcpd.conf configuration, use the following script:
When run, it will print the current provisioning mode for SPARC servers and request for your confirmation before switching the mode. If you continue, the script will backup the dhcpd.conf file, perform the required changes and restart the dhcpd service. |
10.50 | |
Security features | Security | SA Client Session Inactivity is enabled and set by default to 30 minutes. This will lock the SA Java Client if you are idle for the specified period. You need to re-enter the password to unlock the SA Java Client. This setting will not be enforced when upgrading installations that have any custom settings applied under Administration > Users and Groups > Security Settings > Password Policy Settings. | 10.50 |
RHEL7 Core Platform | Support | SA can be installed on servers that are running Red Hat Enterprise Linux 7 (x86_64). | 10.50 |
New for SA Web Client | SA Web Client |
The SA Web Client is only used for downloading the SA Client launcher. The Web Client can be accessed as before, by navigating to a slice IP address or hostname and it features a completely re-designed home page that contains a Download Server Automation Launcher button, information about SA version and build and a link to the HPE Support site. The functionalities that were previously available in SA Web Client can be accessed from the SA Client as follows:
|
10.23 |
New for SA Client Launcher | SA Client Launcher | Authentication to the SA Core is done in the SA Client, after the Launcher has downloaded the required files. The SA Client Launcher now accepts only one input from the user: the SA Core hostname/IP address. A new window appears, where the user must enter the SA username and password. | 10.23 |
Overview | TLS compliance | According to PCI DSS v3.1 standard, TLS v1.1 and v1.2 are required to be used. Also, SSL and early TLS are no longer considered strong from the cryptography point of view. | 10.23 |
Patch installation interview |
During the interview, an additional step appears asking for "Cryptographic Protocol Selection for the Server Automation Components". The options are (with the option to select each of the protocols listed):
|
10.23 | |
Protocol switch tool |
This is a script that automates and eases the change between TLS protocol versions. It can be called automatically from the patch installer or can be run manually by invoking it from command line as follows:
It is recommended to run the script with |
10.23 | |
Supportability |
To use TLS v1.1 or TLS v1.2 protocols, all Cores and satellites must be running an SA version that supports these protocols (SA 10.23 or later). Mixed protocol environment is not officially supported. |
10.23 | |
New satellite media for 10.23 |
|
10.23 | |
Patch rollback with hardened infrastructure |
On hardened infrastructures, the rollback mechanism must be called from SA 10.23 media (or greater). Note When a patch rollback is done on satellites and the cores to which they are connected to do not support TLS v1.0, the services on the satellite will not be started until a new CORD patch/upgrade is done. The services should not be started manually. |
10.23 | |
FIPS and TLS v1.0 | Due to a third-party software limitation, only support for TLS v1.0 exists on FIPS-enabled environments. As a consequence, the only option listed by the patch installer will be TLS v1.0. | 10.23 | |
Red Hat Satellite 6.x support | Support |
Modifications have been made to the HPE Server Automation (SA) RHN import tool to support content download from Red Hat content delivery network (CDN) using Red Hat subscription management (RHSM). This allows you to download content for Red Hat Enterprise Linux 7 (RHEL). |
10.23 |
Latest version of HPE Live Network Connector | HPE Live Network Connector |
The Live Network Connector (LNc) that is installed on the SA core at: /opt/opsware/hpln/lnc/bin is outdated and can no longer be used to download content. Download the latest version of LNc and install it on the core. |
10.23 |
Configured debugging | Agent | Now you can configure debugging for ptymonitor via the ptymonitor.debug_name parameter in the agent's configuration file, agent.args. | 10.22 |
Disabled RC4 | In this release, RC4 has been disabled for SSL encryption. | 10.22 | |
Importing users | A new custom attribute, hpsa_preserve_solaris_user_home_path, allows you to import users using your user-home path in /home/…. In previous SA versions, the import tool added /export to the path. To exclude the /export addition to the path, set the custom attribute to managed server. | 10.22 | |
Uninstalling the Agent | For agents installed on a non-system drive (a feature available from 10.21 onwards for Windows platforms), the agent uninstaller removes symbolic links on the system drive and all agent files, except the target directory. | 10.22 | |
Agent install customization |
Using ADT (Agent Deployment Tool) you can select a maximum of 10 PAPXs to be run sequentially after the agent is successfully installed. If one of the APX scripts fails, the system stops at that step, does not run the remaining APXs, and reports the job as FAILED. Note In case of an error during the APX script run, the system will not roll back the currently successfully run APXs, nor the previouslysuccessfully run APXs Three PAPXs are included for the following functionality:
|
10.22 | |
Optional element | Audit and compliance | A new optional element, preserveExceptions, is available in Audit Policy Filters. The element can be set to Yes or No. | 10.22 |
New for certificates | Certificates | Added CRL (Certificate Revocation List) support for access to SA using SA Client desktop client with smart card authentication. | 10.22 |
HPSA SUSE Manager Importer | Patching |
SA now offers a SUSE Manager Importer tool based on the HPSA RedHat Importer. The tool is capable of importing packages and errata from the SUSE Manager 2.1 Server and creating HPSA Software Policies for errata and packages hosted by SUSE Manager. |
10.22 |
New features | OS provisioning |
|
10.22 |
Upgrades |
|
10.22 | |
New upgraded Third-Party products | Third-Party products | Python upgraded from Python 2.7.3 to Phython 2.7.10. | 10.22 |
New for usability | Usability | Updates to the CAC/PKI SmartCard feature. | 10.22 |
Timeout handling for remediation and installation jobs | Software Management |
Server Automation now offers improved timeout handling for remediation and installation jobs. After a timeout occurs and until the job execution stops, the status of the server is changed to Stopping. While in the Stopping state, the agent does not take on any additional jobs and completes any job that is currently in progress. Moreover, if the timeout occurs during an agent reboot, then after restarting, the agent will not resume the job. After the job execution stops, the server will be marked as Timed Out. This fixes the discrepancy of the core showing the job as Failed because of a timeout, while the agent is performing the job. |
10.22 |
SA Agent Installation to a Non-System Drive | Agents | You can now install the SA Agent to another location in Windows Vista, or a newer Windows version, as long you have an NTFS system drive. Additionally, an SA agent previously installed in the default location can be moved to a new location. The implementation is based on symlinking the default-system drive location to the new install location. | 10.21 |
Installing the Agent to a New Folder |
To designate the new folder, in the Agent Deployment Tool (ADT) Install SA Agent window choose Options > Advanced > Windows installation path field. Note The installation path field only supports ASCII characters. If the directory path contains spaces, do not enclose them in double quotes. |
10.21 | |
Moving a Previously Installed SA Agent To a New Folder |
Agents installed in the default location can be moved to a different location. The following prerequisites must be met:
To move the agent, run the APX Move Agent to Custom Location on the relevant servers. This APX is located in the SA Library in folder /Opsware/Tools/Administrative Extensions. Note You can also move pre-10.2 SA Agents. |
10.21 | |
Uninstalling the Agent |
The agent uninstaller will remove the symbolic links on the system drive and all the agent files, except the target directory structure. However, for pre-10.2 agents, the uninstaller is unable to remove the symbolic links. |
10.21 | |
Integration with OS Provisioning |
OSBPs can use the custom attribute AgentInstallDir to a custom value for Windows agent installation location. If the custom attribute is not present, the agent will be installed to the default location. This custom attribute is ignored for non-applicable platforms. Note The SA Virtualization feature does not support the use of agents located on a non-system drive. |
10.21 | |
Agent Install Customization |
Using ADT (Agent Deployment Tool) you can select a maximum of 10 PAPXs to be run sequentially after the agent is successfully installed. If one of the APX scripts fails, the system will stop at that step and will not run the remaining APXs. In this case the job is reported as FAILED. Note In case of an error during the APX script run, the system will not rollback the currently successfully run, nor the previously successfully run, APXs. Included in this release are three PAPXs for the following functionality:
|
10.21 | |
New Samba Version | Provisioning | New version of Samba (3.6.25). | 10.21 |
Build Plans Changes |
|
10.21 | |
Proliant Content Changes |
|
10.21 | |
Linux Service OS Upgrade | Upgraded Linux service OS to RHEL 6.6. | 10.21 | |
Disk-Space Management During Compliance Scanning and Software Registration | Patching | SA now checks the amount of free space available on managed servers before downloading Windows utility files (such as the Microsoft Offline Catalog) during compliance scanning and software registration. | 10.21 |
Custom Attributes Changes Viewable in the History Panel | Software Management | SA now offers the ability to see custom attributes changes in the History Panel for servers, device groups, OS installation profiles, and software policies. | 10.21 |
Server Scripts Execution | Ability to execute server scripts in parallel. You can also limit the maximum number of scripts executed by an agent at one time. | 10.21 | |
Installing Zip Packages | Added support for installing zip packages with the same filename but different contents by adding file size and checksum verification. This feature works with agent version 10.21 or higher. | 10.21 | |
RHEL 7 Import Available | Import of RHEL 7 content is now possible using the new redhat_import tool through Red Hat Subscription Management. | 10.21 | |
SA Client Support for Windows | Managed Platform Support/OS Systems Support | Windows 8.1 | 10.20 |
SA Managed Platform Support for Additional Operating Systems |
|
||
SA Agent Installation | Agents | SA 10.20 supports SA Agent installation on IPv6. | |
SA Agent for FIPS Enablement | This SA version continues support for enabling FIPS at installation, and also supports enabling FIPS status through the Core Recertification process. In order to support FIPS enablement, your SA Agent version must be SA 10.1 or higher. | ||
SA Agent and IPv6 Support |
This SA version supports the following for the SA Agent:
|
||
Software Policy Ordering | APIs |
The following methods of com.opsware.swmgmt.PolicyAttachable now return the software policies ordered by name:
The policies naming scheme becomes a basic mechanism to control the order in which software policies are remediated within a job. As a consequence the following API methods now remediate the software policies ordered alphanumerically:
|
|
OS build plan flow control |
The following methods have update input parameters:
The com.opsware.osprov.OSBuildPlanJobParams was updated so OS build plan flow control configuration can be checked/set:
|
||
Core Recert Service |
The method startCoreRecertSetup takes the argument CoreRecertSetupJobArgument. This object has changed to include the following methods:
|
||
Other changes |
|
||
Removed or Deprecated APIs | Class com.opsware.system.integration.OOMessageSpec (deprecated in 10.0) was removed from the API. | 10.20 | |
Audit |
You can now perform the following audit-related actions for ESXi servers:
Your ESXi servers must be managed by a vCenter that has PowerShell and PowerCLI installed. |
10.1 | |
Localization | SA 10.20 has been localized to Simplified Chinese, Japanese, German, Russian, French, and Spanish. | 10.1 | |
Oracle Database and Model Repository | Support | SA 10.2 supports Oracle 12c RAC. | 10.1 |
New Features | Provisioning |
|
10.1 |
Legacy syntax for hpsa_netconfig custom attribute deprecated | Use the new JSON-based syntax to specify configuration values for the hpsa_netconfig custom attribute. | 10.1 | |
Support for provisioning of Windows 2003 deprecated | Support for provisioning of Windows 2003 with build plans has been removed. | 10.1 | |
OS Sequences Deprecated |
The following types of OS Sequences are deprecated:
Instead of OS Sequences, use Build Plans for new provisioning jobs. |
10.1 | |
Performance Improvements | Patching |
Windows Patch Compliance Export Performance The Windows “Patch Compliance Export” feature's performance was enhanced. This feature allows you to export compliance information for all Windows patches, and with this release, can scale to a large number of servers more effectively |
10.1 |
Minor Enhancements |
SLES Patching is now performed using the SLES native package manager Zypper on SLES 11 GA or later, replacing yum. |
10.1 | |
Support native tool for remediation on SLES 11 | Software Management |
SA now supports Zypper as the package manager used by remediation jobs on SLES 11 GA or later. |
10.1 |
Viewing package contents for DEB packages |
It is now possible to view the package contents for Ubuntu (DEB) packages, similarly to the functionality already available for RPM and ZIP packages. |
10.1 | |
New features | Virtualization Management |
|
10.1 |
SA Client Support for Windows Operating Systems | Managed Platform Support/OS Systems Support |
The following operating-systems are supported on the SA Client.
|
10.1 |
SA Managed Platform Support for Additional Operating Systems |
|
10.1 | |
SA Platforms |
|
10.1 | |
Faster SA Agent Installation | Agents | For information on the Agent Upgrade tool, on installing the agent, and on bringing servers under SA management, see the SA User Guide. | 10.1 |
SA Agent Installer | The SA Agent Installer was added as a Web Services Data Access Engine (Twist) service. | 10.1 | |
Authentication | Support | SA now supports two-factor authentication using Department of Defense personal identity verification (PIV) smart cards. | 10.1 |
CPU Interface | Central processing unit (CPU) properties are now displayed in the SA Client in the Inventory > Hardware window. | 10.1 | |
Interactive Installation Configurator (iDoc) | Installation |
The Interactive Installation Configurator (iDoc) allows you generate and view (PDF) an SA Core installation procedure document that is confined to only the SA Core configuration and the SA Core Host operating system you have selected. This allows you to view (PDF) or print an installation procedure document that does not contain information intended for SA Core configurations or core host operating systems that are not relevant to the installation you intend to perform. Simply run SA_10.10_core_install_config.zip in a browser, select your preferred SA Core Layout and core host operating system and select View or Print. |
10.1 |
FIPS Compliance Options |
SA complies with the Federal Information Processing Standards publication 140-2, a security standard that enables government entities to procure equipment that uses validated cryptographic modules. During installation you can choose to enable FIPS by setting the fips.mode parameter to enabled. When FIPS is enabled, you will be restricted to SHA1 as the hash algorithm. You will be prompted during the installation to specify whether FIPS should be enabled or not. Under normal security conditions, HP recommends using SHA1 with a key length of 2048. Higher security requirements could require FIPS with a key length of 4096 or SHA256. Note that use of FIPS or SHA256 can impact core performance. Contact your Security Administrator for more information. |
10.1 | |
Reserved Ports |
SA 10.10 requires that the following ports be open: 8084/8086 - For bandwidth management, if enabled These, and other ports, are configurable at install/upgrade time through installer parameters.
Note: In addition, other ports are required to be open for previous releases of SA.
|
10.1 | |
Upgrade |
If your SA Core matches one of the SA Core configurations supported for customer upgrade and described in the SA After the core has been upgraded to SA 10.0, HP supports customer-performed upgrades to SA 10.x or later as long as your core configuration is one of the supported configurations. All other core configurations will continue to require the services of HP Professional Services. If you are uncertain whether you can upgrade an existing SA Core yourself, contact HP Technical Support. |
10.1 | |
Localization | Localization | In addition to Simplified Chinese and Japanese, the SA 10.10 interface has now been localized to German, Russian, French, and Spanish. | 10.1 |
OO-SA Integration | Updates pertaining specifically to the OO-SA integration (Server Automation operations performed within Operations Orchestration) are delivered via the HPE Live Network at https://hpln.hpe.com | 10.1 | |
Oracle 12.1.0.1 |
Oracle Database and Model Repository |
The SA distributions Media includes preinstalled customized Oracle 12.1.0.1 RDBMS software and the truth database that can be installed during the SA core installation. You can also use the Oracle Universal Installer to manually install an Oracle 11g or 12c database, however, you will need to perform certain tasks that the HP-supplied database performs automatically on installation. |
10.1 |
Provisioning |
The following new features have been added to Provisioning for this release:
|
10.1 | |
New Build-Plan Features |
The following new build-plan features have been added:
|
10.1 | |
OS Sequences Deprecated |
The following types of OS Sequences are deprecated:
Instead of OS Sequences, use Build Plans for new provisioning jobs. |
10.1 | |
New for Patching | Patching |
Server Automation (SA) now supports patch management for Ubuntu, enabling you to identify, install, and remove Ubuntu Debian package updates, and maintain a high level of security across managed servers in your organization.
|
10.1 |
OCLI | Software Management | OCLI can now be installed using a software policy on the managed servers. | 10.1 |
Support for Handling Native Chef Cookbooks in SA |
Server Automation (SA) can be used to view and manage Chef Cookbooks and run Chef Recipes. You can upload native Chef Cookbooks to SA, manage them in SA, and run Chef Recipes from SA without having to deploy parallel Chef infrastructure. Features include:
|
10.1 | |
Vertical Scalability: Redesign Job Results |
In order to improve the performance and scalability of remediation jobs, both the job backend and the UI responsible for displaying the job progress and job results were redesigned. Redundant or verbose data was dropped from the job results, reducing the load on the SA components. The user experience is now enhanced by having only relevant data displayed to the user, thus making the user interface much more usable, especially for large remediation jobs. |
10.1 | |
Detach and remediate without uninstall | Software policies can now be detached without remediation. | 10.1 | |
New attribute | UCMDB |
There is a new attribute implemented in mapping.xml:
When enabled (TRUE), the data is flowing in UCMDB. |
10.1 |
Usability |
Two non-supported features (Code Deployment and Rollback (CDR), and Configuration Tracking) were removed from the SA Client interface. CDR was replaced by ADM. Configuration Tracking was replaced by A&R. |
10.1 | |
OpenStack as a Virtualization Service | Virtualization Management | SA's OpenStack as a Virtualization Service provides the ability to add your in-house deployment of OpenStack as a Virtualization Service to discover Projects and VMs (OpenStack Instances). | 10.1 |
FIPS |
SA complies with the Federal Information Processing Standards (FIPS) publication 140-2, a security standard that enables government entities to procure equipment that uses validated cryptographic modules. If FIPS is enabled, you need to upload CA certificates for each virtualization service. |
10.1 | |
Virtualization Secure Mode |
Secure Mode in SA Virtualization is enabled (or True) by default in a new SA 10.10 installation and disabled (or False) on an upgrade to SA 10.1. See also the deprecated and unsupported sections of these release notes for deprecated and unsupported virtualization components. |
10.1 |
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to hpe_sa_docs@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: