Installing and Uninstalling a Hotfix on Security Group Members
This section describes the Full Connectivity installation and uninstall of an Offline CPUSE package.
Important Notes
This procedure is supported only on these:
Notes:
|
|
Notes:
|
Installing a Hotfix Package on Security Group Members
|
Important: |
-
This procedure keeps the current connections in a Security Group.
-
In Maestro: This procedure applies to Security Groups in the Security Gateway, VSNext, and Traditional VSX modes.
In the VSNext mode, you must run all the commands in the context of the Virtual Gateway 0.
In the Traditional VSX mode, you must run all the commands in the context of VS0.
-
In ElasticXL: This procedure applies to Security Groups in the Security Gateway and in the VSNext modes.
In the VSNext mode, you must run all the commands in the context of the Virtual Gateway 0.
-
Do not install the hotfix on all the Security Group Members in a Security Group at the same time.
-
In this procedure, you divide all Security Group Members in a Security Group into two or more logical groups.
In the procedure below, we use two logical groups denoted below as "A" and "B".
You install the hotfix on one logical group of the Security Group Members at one time.
The other logical group(s) of the Security Group Members continues to handle traffic.
Each logical group should contain the same number of Security Group Members - as close as possible.
-
You fail over from the Logical Group "A" to the Logical Group "B".
-
You install the hotfix on the Logical Group "A" while the Logical Group "B" continues to handle traffic.
-
You fail over from the Logical Group "B" to the Logical Group "A".
-
You install the hotfix on the Logical Group "B" while the Logical Group "A" continues to handle traffic.
Examples
Environment
Description
Maestro
Single Site
-
There are 8 Security Group Members in the Security Group.
-
The Logical Group "A" contains Security Group Members from 1_1 to 1_4.
-
The Logical Group "B" contains Security Group Members from 1_5 to 1_8.
Maestro
Single Site
-
There are 5 Security Group Members in the Security Group.
-
The Logical Group "A" contains Security Group Members from 1_1 to 1_3.
-
The Logical Group "B" contains Security Group Members from 1_4 to 1_5.
Maestro
Dual Site
-
There are 4 Security Group Members in the Security Group (on each Site).
-
The Logical Group "A" contains Security Group Members on Site 1 from 1_1 to 1_4.
-
The Logical Group "B" contains Security Group Members on Site 2 from 2_1 to 2_4.
ElasticXL
Single Site
-
There are 3 ElasticXL Cluster Members in the ElasticXL Cluster.
-
The Logical Group "A" contains ElasticXL Cluster Members from 1_1 to 1_2.
-
The Logical Group "B" contains the ElasticXL Cluster Member 1_3.
ElasticXL
Dual Site
-
There are 6 ElasticXL Cluster Members in the ElasticXL Cluster (3 on each Site).
-
The Logical Group "A" contains ElasticXL Cluster Members on Site 1 from 1_1 to 1_3.
-
The Logical Group "B" contains ElasticXL Cluster Members on Site 2 from 2_1 to 2_3.
-
Installation Procedure


Step |
Instructions |
||
---|---|---|---|
A |
Make sure you have the applicable CPUSE Offline package. |
||
B |
Transfer the CPUSE Offline package to the Security Group (into some directory, for example |
||
C |
Connect to the command line on the Security Group. |
||
D |
If your default shell is the Expert mode, then go to Gaia gClish:
|
||
E |
Import the CPUSE Offline package from the hard disk:
Example:
|
||
F |
Show the imported CPUSE packages:
|
||
G |
Make sure the imported CPUSE package can be installed on this Security Group:
Example: |

|
Note - The SMO Image Cloning feature automatically clones all the required software packages to the Security Group Members during their boot. When you install or remove software packages gradually on Security Group Members, it is necessary to disable this feature, so that after a reboot the updated Security Group Members do not clone the software packages from the existing non-updated Security Group Members. |
Step |
Instructions |
|
---|---|---|
A |
Connect to the command line on the Security Group. |
|
B |
If your default shell is the Expert mode, then go to Gaia gClish:
|
|
C |
Examine the state of the SMO Image Cloning feature:
|
|
D |
Disable the SMO Image Cloning feature, if it is enabled:
|
|
E |
Examine the state of the SMO Image Cloning feature again:
|

Step |
Instructions |
||
---|---|---|---|
A |
Connect in one of these ways:
|
||
B |
If your default shell is the Expert mode, then go to Gaia gClish:
|
||
C |
Set the Security Group Members in the Logical Group "A" to the state "
Example:
|
||
D |
Connect to one of the Security Group Members in the Logical Group "A":
Example:
|
||
E |
Go from the Expert mode to Gaia gClish:
|
||
F |
Install the CPUSE hotfix package on the Security Group Members in the Logical Group "A":
Example: |
||
G |
Monitor the system until the Security Group Members in the Logical Group "A" are in the state "
|

Step |
Instructions |
||
---|---|---|---|
A |
Connect in one of these ways:
|
||
B |
If your default shell is the Expert mode, then go to Gaia gClish:
|
||
C |
Set the Security Group Members in the Logical Group "B" to the state "
Example:
|
||
D |
Connect to one of the Security Group Members in the Logical Group "B":
Example:
|
||
E |
Go from the Expert mode to Gaia gClish:
|
||
F |
Install the CPUSE hotfix package on the Security Group Members in the Logical Group "B":
Example: |
||
G |
Monitor the system until the Security Group Members in the Logical Group "B" are in the state "
|
Uninstalling a Hotfix Package on Security Group Members
|
Important: |
-
This procedure keeps the current connections in a Security Group.
-
In Maestro: This procedure applies to Security Groups in the Security Gateway, VSNext, and Traditional VSX modes.
In the VSNext mode, you must run all the commands in the context of the Virtual Gateway 0.
In the Traditional VSX mode, you must run all the commands in the context of VS0.
-
In ElasticXL: This procedure applies to Security Groups in the Security Gateway and in the VSNext modes.
In the VSNext mode, you must run all the commands in the context of the Virtual Gateway 0.
-
Do not uninstall the hotfix from all the Security Group Members in a Security Group at the same time.
-
In this procedure, you divide all Security Group Members in a Security Group into two or more logical groups.
In the procedure below, we use two logical groups denoted below as "A" and "B".
You uninstall the hotfix from one logical group of the Security Group Members at one time.
The other logical group of the Security Group Members continues to handle traffic.
Each logical group should contain the same number of Security Group Members - as close as possible.
-
You fail over from the Logical Group "A" to the Logical Group "B".
-
You uninstall the hotfix from the Logical Group "A" while the Logical Group "B" continues to handle traffic.
-
You fail over from the Logical Group "B" to the Logical Group "A".
-
You uninstall the hotfix from the Logical Group "B" while the Logical Group "A" continues to handle traffic.
Examples
Environment
Description
Maestro
Single Site
-
There are 8 Security Group Members in the Security Group.
-
The Logical Group "A" contains Security Group Members from 1_1 to 1_4.
-
The Logical Group "B" contains Security Group Members from 1_5 to 1_8.
Maestro
Single Site
-
There are 5 Security Group Members in the Security Group.
-
The Logical Group "A" contains Security Group Members from 1_1 to 1_3.
-
The Logical Group "B" contains Security Group Members from 1_4 to 1_5.
Maestro
Dual Site
-
There are 4 Security Group Members in the Security Group (on each Site).
-
The Logical Group "A" contains Security Group Members on Site 1 from 1_1 to 1_4.
-
The Logical Group "B" contains Security Group Members on Site 2 from 2_1 to 2_4.
ElasticXL
Single Site
-
There are 3 ElasticXL Cluster Members in the ElasticXL Cluster.
-
The Logical Group "A" contains ElasticXL Cluster Members from 1_1 to 1_2.
-
The Logical Group "B" contains the ElasticXL Cluster Member 1_3.
ElasticXL
Dual Site
-
There are 6 ElasticXL Cluster Members in the ElasticXL Cluster (3 on each Site).
-
The Logical Group "A" contains ElasticXL Cluster Members on Site 1 from 1_1 to 1_3.
-
The Logical Group "B" contains ElasticXL Cluster Members on Site 2 from 2_1 to 2_3.
-
Uninstall Procedure

|
Note - The SMO Image Cloning feature automatically clones all the required software packages to the Security Group Members during their boot. When you install or remove software packages gradually on Security Group Members, it is necessary to disable this feature, so that after a reboot the updated Security Group Members do not clone the software packages from the existing non-updated Security Group Members. |
Step |
Instructions |
|
---|---|---|
A |
Connect to the command line on the Security Group. |
|
B |
If your default shell is the Expert mode, then go to Gaia gClish:
|
|
C |
Examine the state of the SMO Image Cloning feature:
|
|
D |
Disable the SMO Image Cloning feature, if it is enabled:
|
|
E |
Examine the state of the SMO Image Cloning feature again:
|

Step |
Instructions |
||
---|---|---|---|
A |
Connect in one of these ways:
|
||
B |
If your default shell is the Expert mode, then go to Gaia gClish:
|
||
C |
Set Security Group Members in the Logical Group "A" to the state "
Example:
|
||
D |
Connect to one of the ElasticXL Cluster Members in the Logical Group "A":
Example:
|
||
E |
Uninstall the CPUSE hotfix package on the Security Group Members in the Logical Group "A":
Example: |
||
F |
Monitor the system until the Security Group Members in the Logical Group "A" are in the state "
|

Step |
Instructions |
||
---|---|---|---|
A |
Connect in one of these ways:
|
||
B |
If your default shell is the Expert mode, then go to Gaia gClish:
|
||
C |
Set Security Group Members in the Logical Group "B" to the state "
Example:
|
||
D |
Connect to one of the ElasticXL Cluster Members in the Logical Group "B":
Example:
|
||
E |
Uninstall the CPUSE hotfix package on the Security Group Members in the Logical Group "B":
Example: |
||
F |
Monitor the system until the Security Group Members in the Logical Group "B" are in the state "
|

Step |
Instructions |
|
---|---|---|
A |
Connect to the command line on the Security Group. |
|
B |
If your default shell is the Expert mode, then go to Gaia gClish:
|
|
C |
Get the list of the installed packages:
|