Release notes > Known issues, limitations, and workarounds

Known issues, limitations, and workarounds

The 10.60 release of SA has the following known issues and limitations.

ID Area Description
QCCR1D240343 Certificate Gateway recertification fails during core recertification from third party to legacy certificate mode.
QCCR1D240498 Certificate

In phase 13 of Core recertification, not all certificates and secret keys are removed.

Workaround:Old certificates and secret keys should be removed.

QCCR1D240611 Certificate

Self-signed agent certificates are issued with 8 years of validity instead of 10 years of validity.

Workaround:Manually update the validity period in the database by running the following command on the SA Core:

/opt/opsware/bin/python -m opsware_common.config_editors update spin --name "spin.cogbot.crypto_validity_period" --value 3650 .

QCCR1D240649 Certificate Recurring jobs are failing after recert phase 9.
QCCR1D240974 Installer (OI)

CA certificates in the components folder are not removed by upgrade process on satellites.

Workaround: Remove the following files from the satellite servers once the upgrade is completed:

  • /var/opt/opsware/crypto/wordbot/admin-ca.crt
  • /var/opt/opsware/crypto/wordbot/agent-ca.crt
  • /var/opt/opsware/crypto/wordbot/opsware-ca.crt
  • /var/opt/opsware/crypto/wordcache/admin-ca.crt
  • /var/opt/opsware/crypto/wordcache/agent-ca.crt
  • /var/opt/opsware/crypto/wordcache/opsware-ca.crt
CCR1D241194 Certificate Agent certificate generator test from SysDiag fails after core recert with omit_self_signed_certificates set.
QCCR1D241696 Installer (OI)

Resumed core installation updates security.conf to default values

Workaround: Add the fips.mode, crypto.hash_algorithm and the crypto.key_length parameters in the cdf.xml file used for the resumed install. You can find the correct values for these parameters in the /etc/opt/opsware/crypto/security.conf file.

QCCR1D242476 OO Integration In SA-OO integration, an invalid OO URL exception is thrown when running the approval flow.
QCCR1D242342 Manage Platform Multiple Vendor Recommended Patch Policy for the same Windows platform are available after SA is upgraded to the version 10.60.
QCCR1D242507 Patch Management Backend Ubuntu 14.04 Dynamic Patch Policy remediation appears as failed.
QCCR1D239007 Patch Management

Package install does not work by default in Ubuntu 16.04.

Workaround: Install python and python-apt packages on the target managed server to enable the install package functionality.

QCCR1D237482 Data migration

System Diagnostics jobs created prior to the SA10.60 upgrade fail with the following error message:

"Invalid component buildmgr specified Valid components are :['truth', 'spin', 'word', 'way', 'vault', 'twist']"

This is expected behavior, since the Build Manager component is no longer included in SA 10.60 and later. SA required this component only for executing OS Sequences, which have been completely replaced by OS Build Plans.

QCCR1D238059 Installer

Upgrading a Mesh to SA 10.60 after a CORD patch rollback fails if the crypto.hash_algorithm, fips.mode or crypto.key_length parameters do not have the default values.

Workaround: Add the fips.mode, crypto.hash_algorithm and the crypto.key_length parameters in the cdf.xml file used for the upgrade. You can find the correct values for these parameters in the /etc/opt/opsware/crypto/security.conf file.

QCCR1D239221 Installer (OI)

When adding slices to a core, the CSRs for the new slices are generated with default values for the crypto.key_length, crypto.hash_algorithm and fips.mode parameters

Workaround: Add the fips.mode, crypto.hash_algorithm and the crypto.key_length parameters in the cdf.xml file used when adding the new slices. You can find the correct values for these parameters in the /etc/opt/opsware/crypto/security.conf file.

QCCR1D238186 Automation Platform Extensions (APX)

By default, when working in third-party certificate mode, you cannot use the BRDC HPSA agent sanitizer APX. This limitation is due to the recent changes introduced in the SA Agent Install flow which accommodate the new third-party certification mode.

Workaround: When working in third-party certificate mode, set the spin.agent.bootstrap_enabled parameter to 1. This allows SA Agents to register with the SA Core using the Bootstrap certificate. You can then replace this SA self-signed certificate with a third-party one. For more information see Self-signed temporary SA Agent certificates section in the SA 10.60 Administration guide.

QCCR1D239214 Product Functionality

Secondary Core installation fails when trying to connect to a primary Core that uses Oracle Database 11g.

This error occurs if the secondary Core you are installing is using SA 10.50 and later. These versions install Oracle Database 12c for all the SA Cores.

Ensure your secondary Core is using the same database version as the one on the primary Core.

QCCR1D238686 OS Provisioning You cannot provision Windows operating systems using static UI.
QCCR1D237353 Installer

You cannot upgrade to SA 10.60 if the SA Core’s existing certificate is MD5 base.

Workaround: Recertify the SA Core to use a different signature algorithm.

QCCR1D238614 Product Functionality Core Recertification fails in mesh environments when any of the Satellites connected to a 10.60 Core use a previous SA version.
QCCR1D233169 Patch Management Backend

Some failed patch installations may show up as successful although they have been rolled back during server reboot.

Workaround: Always check the Patch Compliance page of the Job Status window to make sure you are getting the correct result for your remediation job.

QCCR1D159841 Software Management Backend

When upgrading a Core, SA may show UNITS and REALM_UNITS tables conflicts.

Workaround: Resolve conflicts manually or use the Force Resolver script then continue with the upgrade. To minimize the number of model repository conflicts, run all operations on units through the master spin.

QCCR1D151092

Patch Management

 

Duplicated patches exist between HPLN Patches and WSUSSCN2.CAB Patches.

Workaround: A hotfix is available on the HPE support site.

QCCR1D161961 Patch Management Backed

The uninstallation of SP1 on Windows 2008 R2 fails with timeout.

Workaround: No workaround; the issue corrects itself with the next scan.

QCCR1D162337 Patch Management

The W2k12 software policy remediation fails with the error, "AGENT_ERROR_PATCH_DATABASE_CERTIFICATE_ERROR".

Workaround: Import and run the latest Microsoft patch CAB file.

QCCR1D147304 Patch Management

The second recommended binaries for KB979309 and KB2416400 are not shown as recommended binaries in SA, but are available in scanpatchoutput.

QCCR1D223544 Patch Management The com.hp.sa.patching.ubuntu.importer.deb.pre_approval_path parameter is not used during the package import.
QCCR1D131674 Patch Management Backend The services of Create Solaris Patch Policy exposed through the API do not validate the Platforms added.
QCCR1D163518 Software Management UI Server remediation is completed but the job is still in progress.
QCCR1D193587 Agent Deployment/Upgrade Backend Cannot deploy IPV6 enabled servers with ADT; the scan shows SSH port is not available.
QCCR1D92244 Search Backend Searching on extended ASCII (that is European) characters returns no matching results.
QCCR1D192728 Agent Deployment/Upgrade UI Error message appears in NGUI when scanning ranges using * or /24 (CIDR) notations.
QCCR1D192013 Server Module (SMO) Backend Windows Local Security Settings SMO reports incorrect Security Settings for Not Applicable entries.
QCCR1D183967 Audit & Compliance Backend User and Group Snapshot Remediation Error ( in both Windows and Unix systems).
QCCR1D193063 Server Module (SMO) Backend SMTool upload fails when /var/tmp folder is not present on the twist box where the command is run.
QCCR1D151552 Audit & Compliance UI Server Compliance View: Skipped server displays "Policy has changed since the last scan" when there has been no change in policy.
QCCR1D166350 Work Load Manager Job stuck in Active status while its task is Successful.
QCCR1D203515 Installer (OI) Word can complain about tens of missing files in case of multislice environment on top of a custom LVM partitioning.
QCCR1D224267 Installer (OI) Giving custom realm_name to a satellite [different from facility name] breaks functionality.
QCCR1D227522 Installer (OI) Slices do not show the right SA version in the NGUI client.
QCCR1D227998 Installer (OI) Additional slice installation fails if there are recurring jobs configured.
QCCR1D232581 Installer (OI) Variables in kickstart file on Satellite (ks-linux6SERVER-X86_64-ogfs.cfg) are not replaced.
QCCR1D188553 Truth (Model Repository) SA installed Oracle RDBMS modifies file /etc/sysconfig/selinux and inserts entry for SELINUX regardless of whether a previous entry exists.
QCCR1D232666 Agent Rolling back an SA patch causes cert.pem from OPSWopenssl to be deleted.
QCCR1D193091 Gateway After upgrading core from 10.0 to IMR2, the 10.0 satellite is unreachable.
QCCR1D184455 Certificate

Core Recert on FIPS enabled core will cause buildmgr to fail starting after phase 9.

QCCR1D184908 Certificate In multiple slices mesh environment without satellite, run corerecert -s after run core recert -phase, shows Core recert session not in progress.
QCCR1D189612 Certificate cleanup_old_opsware_ca should include remove old certifcate files from crypto.0
QCCR1D189893 Certificate For Primary Core Infrac only non slice box, certficate in word_upload directory are not recerted.
QCCR1D194366 UCMDB SA - UCMDB integration does not load SA data correctly when UCMDB server is configured in multi-tenancy mode.
QCCR1D191478 Manage Platform CentOS 7 Build Plan fails with TypeError after migration from SA 10.02 with platform installed to SA 10.2.
QCCR1D232004 Manage Platform The Deploy VM job fails on Windows Server 2016 x64.
QCCR1D131725 Patch Management Backend The services of Create Solaris Patch Policy exposed through API do not validate the platforms added.
QCCR1D181473 SAV (Server Automation Visualizer) SAV does not show IPv6 Inet addresses or IP address for loopback
QCCR1D111925 APX Copy Configs APX does not give a user understandable message when target directory does not exist.
QCCR1D160891 Virtualization UI Cannot delete VMs in a life-cycle state "Build Failed".
QCCR1D142522 DCML Export Tool (DET) CBT full export hangs.
QCCR1D160408 HPUX Virtualization-HPVM Frontend Search with IP Address or Hostnames on Add Virtual Server screen does not list HP-UX machines.
QCCR1D183608 Virtualization Backend Floating IP for OpenStack servers is not present in the list of IP interfaces.
QCCR1D209175 Patch Management Backend MS Patch DB import status in SA Client may not reflect the actual status.
QCCR1D229895 Patch Management

When importing RedHat 6 rpms using redhat_import, any "++" characters available in the package title are converted to spaces.

This leads to the following error when trying to apply patches: "An error occurred while installing or removing this package. The package may not be applicable to the selected server. Parameters: results: {0} package: {1} command: {2} Action: Ensure that the package is correctly defined and applicable to the selected server. If the problem persists, please contact technical support".

QCCR1D179480 Software Management Backend

The tokens used by recurring application configuration compliance jobs have a limited lifetime of one year. This causes the recurring jobs to stop working without a warning.

QCCR1D219299 Product Functionality Cannot install/update HP-UX operating environments through SA patching mechanism.
QCCR1D220924 Patch Management Backend MemoryError exception raised when remediating HP-UX managed servers.
QCCR1D93690 Storage DB Scanner For Application (Database) created on Virtual Machine, SAN relationship (SAN Fabrics, Switches) information is displayed, but for Virtual Machine, SAN relationship (SAN Fabrics, Switches) is blank.
QCCR1D105953 Storage Host Agent (storex) On RHEL 5.4 x64 (8 GB/s HBA Card), Filesystem and Manager Software panels are blank and in OGFS FileSystem and Services Folders are NOT present.
QCCR1D219299 Software Management Backend Unable to install/update HP-UX operating environments through SA patching mechanism.
QCCR1D112384 APX It is not possible to turn on debug logging in apx.c.
QCCR1D191511 Truth (Model Repository) Oracle RAC Connection Failover is not transparent.
QCCR1D172654 OCC Web SA 10.0 installer should validate /etc/hosts against multiple 'localhost' definitions.
QCCR1D202377 Installer (OI) CORD installer does word_uploads before patch_opsware.
QCCR1D209907 Installer (OI) The installer should be more idempotent to restarts and failures.
QCCR1D222141 Installer (OI) Tsunami not enabled for Satellites upgraded from SA 9.1x.
QCCR1D157372 Patch Management SA displays incorrect message when it tries to remediate HP-UX server (without custom attribute).
QCCR1D213724 Installer (OI) Secondary Core installation error - Failed to determine data pump dir.
QCCR1D156389 Server Module (SMO) Backend Windows Users and Groups SMO do not work on Windows 2012 Essentials.
QCCR1D157228 Patch Management Backend Install of Q2416400 failed with exit code 4 when reboot was suppressed in the remediation job although the patch was actually installed.

Related topics

What's new in Server Automation 10.60
Server Automation version history
Enhancements
Fixed defects