Jump to content

How to upgrade KATA 3.7.2 > 4.0 > 4.1 > 5.0 > 5.1 > 6.0 > 6.1 [KATA/KEDRE]


Recommended Posts

Antipova Anna
Posted

Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.

In order to upgrade KATA from 3.7.2 to 4.0 > 4.1 > 5.0 > 5.1 > 6.0 please follow the manual below.

 

Step-by-step guide

Prior to PCN upgrade you have to disconnect all Sensors, SCNs and Sandboxes.

After upgrade Sandboxes and Sensors must be reinstalled, disconnected SCNs – upgrade to 4.0 and 4.1 and then reconnect them to PCN.

Upgrade order described here - https://support.kaspersky.com/KATA/4.0/en-US/198801.htm

Information which is kept during upgrade - https://support.kaspersky.com/KATA/4.0/en-US/227848.htm

Contents of backup - https://support.kaspersky.com/KATA/4.0/en-US/198854.htm

NB! Events database is not being transferred if you want to restore backup to new installation (e.g. new physical or virtual server). 

System requirements are the same for 3.7.2 and 4.0/4.1, so if 3.7.2 installation matches the requirements, you can upgrade keeping the same hardware/VM configuration - https://support.kaspersky.com/KATA/4.0/en-US/194861.htm

For upgrade you don’t need .ktgz archives, only the ISO file.

Pre-upgrade recommendations

This recommendation is optional for vanilla 3.7.2, and it's a must for 3.7.2 PF1

Before upgrading KATA 3.7.2 to KATA4, copy and run this script.

Run it as root:

python /var/opt/kaspersky/apt/files/kata4-preupgrade-checker.py

Expected result for vanilla 3.7.2:

image.thumb.png.6b82ab0991a1ddafc7e9fc1b30589df2.png

In case any issues arise, please contact Kaspersky support, and provide script output as shown on screenshot above and this script log, the script shows log location upon completion: /data/kata4-preupgrade-checker.log

Upgrade order

  • Create backup of CN and do the manual backup of /var/opt/kaspersky/apt-preprocessor/preprocessor.conf (from CN and sensors, especially if tuning was made at sensors).
  • Mount installation ISO to KATA VM or boot from drive with ISO, if a server is physical.
  • Select Install Kaspersky Anti Targeted Attack Platform.
  • Select Disk marked as [upgrade] and press Enter.

image.thumb.png.337e564148ab5eaa1559091b187881ea.png

  • Select Upgrade and press Enter

image.thumb.png.fe048346707d893d483f68c2f8969d35.png

  • Select Upgrade again and press Enter

image.thumb.png.2c3da3d3fe9277b7289aac5af2b5cf9b.png

  • Wait for the completion and check at WEB UI, that there are no errors / issues / etc.

    image.png.a8c8d022b9935e032b438e41e17af15c.png
    Storage migration is a lengthy procedure and may take many hours, depending on the installation. No visual indication of progress is provided, but it's not frozen.

  • Perform a backup of 4.0
  • The upgrade procedure from 4.0 up to 4.1 is pretty much the same, you have to map ISO and boot from it, select disk marked as [upgrade], proceed, make a backup of 4.1

Upgrade procedure from 4.1 to 5.0 is described here.

Before updating the product from version 4.1 to version 5.0, check which boot mode is used on the server (BIOS or UEFI). If UEFI is used, the update will fail. To avoid this, you need to update from a special KATA 5.0 image which can be provided by Kaspersky Support.

Before upgrade DISABLE NTP on 4.1

     1) You can obtain file upgrade_preparation-1.0-py3-none-any.whl in kata-cn-5.0.0-5201-inst.x86_64_en-ru.iso, just mount it in Windows, go to support folder, copy this file and put it to /tmp  via WinSCP to your KATA 4.1.

image.thumb.png.8562951093cfa23c9ae19f8e94df5a52.png

    2) Proceed with steps described in Online help

  • After mounting ISO and running from it you will be prompted to say y + ENTER to upgrade

image.thumb.png.875cc17820f108c7407f081f81fd44db.png

  • Then press ENTER, read EULA and select "I accept"

image.thumb.png.9891ddfadc895816f122917578e73d80.png

image.png.8e80fb48836b39454e2236e07ca10d0b.png

image.thumb.png.f33d3b067798af42e491b179c22ea7d9.png

  • Then you have two options: leave cluster and bridge/overlay subnets by default (just by pressing ENTER in windows below) or you can change them as you want (especially if these subnets crossover with your infrastructure subnets)

image.png.8c37254daa186409366ca5ca75653b00.png

image.png.7ce8284721fcbc11fd155b92b356fc41.png

  • Upgrade procedure can take a while, after that you'll be prompted to choose management interface, enter it's details again

image.png.2fad603f514e42bb24ef0a7a3a95a282.png

  • Enter password for admin

image.thumb.png.67f6f4546e940aba62e6f9d694c0c08f.png

  • Configure DNS servers and press ENTER

image.thumb.png.302bf7130cdd721f975da068e0afda68.png

  • Enable SPAN capturing by typing y or skip this step as and press ENTER (you can do it later after upgrade).

image.thumb.png.ca9a0a3de9b0f46f6fd99dcb4d83041d.png

image.png.5d7c73c18adb0ebd287f72d5342d5a19.png

Once the configuration is completed, it's possible to log in to Web UI as regular local admin: use Administrator/Administrator login and password, "Local administrator" checkbox must be enabled, too. Change the password for Administrator user and proceed with adding license, creating users etc.

Upgrade procedure from 5.0 to 5.1 is described here.

Step-by-step guide of upgrade is here.

Information kept during upgrade is here.

  • According to KB you have to upload upgrade.tar.gz to /data/upgrade
  • But first, you have to create this directory and set permissions to it to be able to upload upgrade package via WinSCP (in this example we use chmod 777 as an ultimate set of rights, you can use another set) 

    mkdir /data/upgrade
    chmod 777 /data/upgrade
  • After that upload upgrade.tar.gz to /data/upgrade via WinSCP and unarchive it

    cd /data/upgrade
    tar xvf upgrade.tar.gz
  • Give executive permissions to script install_kata_upgrade.sh and install pre-upgrade package

  • Execute as root

    chmod +x /data/upgrade/install_kata_upgrade.sh
    sh install_kata_upgrade.sh

    You'll see this image.png.0c8356569d47e3fd5baa796a8f0ddf90.png

  • And finally run upgrade (use admin user credentials which you use for ssh)

    kata-upgrade --data-dir /data/upgrade --user admin --password 'passw@rd'
  • In a while you should receive message about successful upgrade  .image.thumb.png.11e16327cfa34b1c23161ea41ec8e260.png

 

Upgrade procedure from 5.1 Ubuntu to 6.0 Ubuntu is described HERE

Step-by-step guide of upgrade is HERE

Information kept during upgrade is HERE

  • Upload kata-cn-ubuntu-upgrade-6.0.0-200-x86_64_en-ru.tar.gz via WinSCP to /home/admin
  • Unpack it to /data by command
tar xvf /home/admin/kata-cn-ubuntu-upgrade-6.0.0-200-x86_64_en-ru.tar.gz -C /data/

image.thumb.png.44e01b20bab3383e40c2e60c0d0871f8.png

  • Install the upgrade package by running the following commands
cd /data/upgrade/
 
chmod +x ./install_kata_upgrade.sh
 
./install_kata_upgrade.sh

image.thumb.png.107b82834f3f7962053066923ceaaf04.png

  • Install the upgrade by running the following commands
source /tmp/upgrade-venv/venv/bin/activate
 
kata-upgrade --data-dir /data/upgrade/ --password <password specified during component installation>

If the password contains special characters, the password variable must be specified in the following format: --password '<password>'

  • Mount the iso image of Kaspersky Anti Targeted Attack Platform version 6.0 and restart the server

image.thumb.png.65f061e4b9387a2966fd8b0ffb3db5ba.png

  • In the GRUB menu, select Upgrade KATA 5.1

image.thumb.png.290e1b93446450f75a353462c143e1b6.png

  • Accept EULA

image.thumb.png.cf5e40675e556b8a1150ba913f398b97.png

  • Confirm upgrade

image.thumb.png.8d8ee03f268a7c61d0a17e493bc94135.png

  • Wait for completion, don't forget to remove ISO or ensure that after reboot KATA boots from local disk. Done.

Known problem: during upgrade to 6.0 upgrade script may fail

With the following error:

2024-10-21 10:56:16,664.664 [kata_upgrade.tasks.upgrade_base_task][ERROR] Upgrade task " (UpdateDeploymentServices)" completed with an error, elapsed time: 191.07 sec
Traceback (most recent call last):
  File "/tmp/upgrade-venv/venv/lib/python3.11/site-packages/etcd3/client.py", line 46, in handler
    return f(*args, **kwargs)
           ^^^^^^^^^^^^^^^^^^
  File "/tmp/upgrade-venv/venv/lib/python3.11/site-packages/etcd3/client.py", line 257, in get_response
    return self.kvstub.Range(
           ^^^^^^^^^^^^^^^^^^
  File "/tmp/upgrade-venv/venv/lib/python3.11/site-packages/grpc/_channel.py", line 1161, in __call__
    return _end_unary_response_blocking(state, call, False, None)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/tmp/upgrade-venv/venv/lib/python3.11/site-packages/grpc/_channel.py", line 1004, in _end_unary_response_blocking
    raise _InactiveRpcError(state)  # pytype: disable=not-instantiable
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
grpc._channel._InactiveRpcError: <_InactiveRpcError of RPC that terminated with:
        status = StatusCode.UNAVAILABLE
        details = "DNS resolution failed for etcd.dyn.kata:2379: C-ares status is not ARES_SUCCESS qtype=A name=etcd.dyn.kata is_balancer=0: Timeout while contacting DNS servers"
        debug_error_string = "UNKNOWN:DNS resolution failed for etcd.dyn.kata:2379: C-ares status is not ARES_SUCCESS qtype=A name=etcd.dyn.kata is_balancer=0: Timeout while contacting DNS servers {grpc_status:14, created_time:"2024-10-21T10:56:16.663456976+00:00"}"
>
After which web interface is not be accessible with Administrator credentials.

Solution:
Login to web interface using admin credentials (not Administrator)
If current sizing by Endpoint Agents is not 0 then remember current value and set it to 0.
If this setting cannot be applied because there are 0s for other integrations then set mail to 1.
For example:

Would be changed to

Apply this configuration, login back with admin credentials and configure original values back:

The point is to zero out any single of the integrations and then configure it back to original value, so depending on original configuration you may need to zero out other integration instead of Endpoint Agents.
After this login to web interface with Administrator should work. Do that and wait till all errors in dashboard are cleared.
Now you can restart upgrade script from step 5:

sudo -i
cd /data/upgrade/
./install_kata_upgrade.sh
source /tmp/upgrade-venv/venv/bin/activate
kata-upgrade --data-dir /data/upgrade/ --password ... --current-task-index 5

 

Known problem: during upgrade to 6.0 when booting to iso an error is displayed:

image.thumb.png.cb4e5941eb3be5db0fc98e72df08e1a5.png

File /mnt/debconf_menu_answers.ini not found

Possible causes:

  • Upgrade script that was running before reboot did not finish successfully. 

Check logs in /var/log/kaspersky/installation/. It is safe to boot not from iso at this point to check that log.

In case script failed (but not like above) escalate incident.

  • Wrong partitioning of /dev/sda, where there is sda4 instead of sda3.

Check output of lsblk -o NAME /dev/sda

Correct output:

# lsblk -o NAME /dev/sda
NAME
sda
├─sda1
├─sda2
└─sda3

Wrong output:
 

# lsblk -o NAME /dev/sda
NAME
sda
├─sda1
├─sda2
└─sda4

Solution:
 

$ sudo -i

1) Create partition table backup
 

# sfdisk -d /dev/sda > sda.bkp
# cp sda.bkp sda.new

2) Edit partition table file

# vi sda.new

3) Enter edit mode by pressing "i" and change /dev/sda4 to /dev/sda3

For example if you have 

image.thumb.png.2e63f639a597cfa96575829e73812d53.png

Change the number 4 to 3. Nothing else should be changed in the file!

image.thumb.png.6707344e7d7e37b844b8419149ba8a4d.png

To save press ESC then :wq! and Enter.

Apply new partition table

# sfdisk --no-reread -f /dev/sda < sda.new

Now you can boot from iso and continue upgrade.

Upgrade procedure from 5.1 Ubuntu to 6.0 Astra is described below

Installation is described here https://support.kaspersky.ru/KATA/6.0/en-US/243480.htm

But, we have some differences here

  • Upload kata-cn-astra-upgrade-6.0.0-200-x86_64_en-ru.tar.gz to /data
  • Then move to *****@*****.tld:~# cd /data
  • Execute  
    tar xvf /data/kata-cn-astra-upgrade-6.0.0-200-x86_64_en-ru.tar.gz -C /data/
  • Execute
    cd /data/upgrade/
    
    chmod +x ./install_kata_upgrade.sh
    
    source /tmp/upgrade-venv/venv/bin/activate
    
    kata-upgrade --data-dir /data/upgrade/ --password <password of the 'admin' user>
  • Mount the iso image of Kaspersky Anti Targeted Attack Platform version 6.0 and restart the server.
  • You have to start server from mounted ISO and select "Upgrade KATA 5.1 server"

    image.thumb.png.59373b79ff5d2c0d2557e6c0a56d6bc8.png

  • Proceed    

image.thumb.png.8b2e53b88ce2e055181f901f1771364f.png    

image.thumb.png.19161f0dac855704b5b1f2223a68ddaa.png

image.thumb.png.fa2c687d1155ae2a6495a13182ab6dbb.png

image.thumb.png.55f9d522b172d3721b97e52919b52baf.png

image.thumb.png.3abeeec5039bb09f7c1cd2f8d14c3484.png    

  • That's it, you've upgraded your 5.1 Ubuntu to 6.0 Astra

    image.thumb.png.c122845e9ebd6b3f717dbae0122746d3.png

image.png.3ddedbde37c79d71d0cdc9a3afa5a1a9.png

 

image.png

Upgrade procedure from 6.0 to 6.1 is below

https://support.kaspersky.com/help/KATA/6.1/en-US/246850.htm

It considers upgrade from 6.0 or 6.0.1 directly to 6.0.2 - https://support.kaspersky.com/KATA/6.0/en-US/271957.htm, to 6.0.3, and finally to 6.1 - https://support.kaspersky.com/help/KATA/6.1/en-US/243480.htm

6.0 > 6.0.1

  • Upload upgrade.tar.gz to /home/admin directory 
  • Execute following commands below 
    root@1.srv.node1.node.dyn.kata:~# mv /home/admin/upgrade.tar.gz /data/
    root@1.srv.node1.node.dyn.kata:~# tar xvf /data/upgrade.tar.gz -C /data/
    upgrade/
    upgrade/images.tar.gz
    upgrade/install_kata_upgrade.sh
    upgrade/kata_license-1.0-py3-none-any.whl
    upgrade/kata_upgrade-1.0-py3-none-any.whl
    upgrade/ubuntu_image_versions.json
    upgrade/updates/
    upgrade/updates/Packages.gz
    upgrade/updates/glibc_2.35-0ubuntu3.6.debian.tar.xz
    upgrade/updates/glibc_2.35-0ubuntu3.6.dsc
    upgrade/updates/glibc_2.35.orig.tar.xz
    upgrade/updates/glibc_2.35.orig.tar.xz.asc
    upgrade/updates/libc-bin_2.35-0ubuntu3.6_amd64.deb
    upgrade/updates/libc-dev-bin_2.35-0ubuntu3.6_amd64.deb
    upgrade/updates/libc-devtools_2.35-0ubuntu3.6_amd64.deb
    upgrade/updates/libc6-dev_2.35-0ubuntu3.6_amd64.deb
    upgrade/updates/libc6_2.35-0ubuntu3.6_amd64.deb
    root@1.srv.node1.node.dyn.kata:~# cd /data/upgrade/
    root@1.srv.node1.node.dyn.kata:/data/upgrade# chmod +x ./install_kata_upgrade.sh
    root@1.srv.node1.node.dyn.kata:/data/upgrade# ./install_kata_upgrade.sh
    Processing ./kata_license-1.0-py3-none-any.whl
    Installing collected packages: kata-license
      Attempting uninstall: kata-license
        Found existing installation: kata-license 1.0
        Uninstalling kata-license-1.0:
          Successfully uninstalled kata-license-1.0
    Successfully installed kata-license-1.0
    WARNING: There was an error checking the latest version of pip.
    Processing ./kata_upgrade-1.0-py3-none-any.whl
    Installing collected packages: kata-upgrade
    Successfully installed kata-upgrade-1.0
    WARNING: There was an error checking the latest version of pip.
    Installation was successful!
  • Then execute and wait until completion
    kata-upgrade --data-dir /data/upgrade/ --password <password of the 'admin' user>       <<<<<<<< use ' ' symbols if special symbols are presented in password
     
    ............................................................................................................................................................
     
    2024-09-10 15:46:02,038.38 [kata_upgrade.context.ssh_execution_context][INFO] manager.cluster.dyn.kata: Closed ssh session
    2024-09-10 15:46:02,038.38 [kata_upgrade.tasks.upgrade_base_task][INFO] Upgrade task "Update product stack sizing via management api (UpdateSizing)" completed successfully, elapsed time: 896.77 sec
    2024-09-10 15:46:02,039.39 [kata_upgrade.updater.updater][INFO] WARNING: Please close all current user sessions to complete the upgrade process.
  • Patch 6.0.1 is installed, you can check it at web UI
     image.thumb.png.bb012a2c9ab751a5f015403432b6c02e.png

6.0.1 > 6.0.2 

  • Upload kata-cn-upgrade-6.0.2-x86_64_en-ru.tar.gz to /home/admin directory 
  • Execute following commands below 
    root@1.srv.node1.node.dyn.kata:/data/upgrade# mv /home/admin/kata-cn-upgrade-6.0.2-x86_64_en-ru.tar.gz /data/
    root@1.srv.node1.node.dyn.kata:/data/upgrade# tar xvf /data/kata-cn-upgrade-6.0.2-x86_64_en-ru.tar.gz -C /data/
    upgrade/
    upgrade/images.tar.gz
    upgrade/install_kata_upgrade.sh
    upgrade/kata_license-1.0-py3-none-any.whl
    upgrade/kata_upgrade-1.0-py3-none-any.whl
    upgrade/ubuntu_image_versions.json
    upgrade/updates/
    upgrade/updates/Packages.gz
    upgrade/updates/glibc_2.35-0ubuntu3.6.debian.tar.xz
    upgrade/updates/glibc_2.35-0ubuntu3.6.dsc
    upgrade/updates/glibc_2.35.orig.tar.xz
    upgrade/updates/glibc_2.35.orig.tar.xz.asc
    upgrade/updates/libc-bin_2.35-0ubuntu3.6_amd64.deb
    upgrade/updates/libc-dev-bin_2.35-0ubuntu3.6_amd64.deb
    upgrade/updates/libc-devtools_2.35-0ubuntu3.6_amd64.deb
    upgrade/updates/libc6-dev_2.35-0ubuntu3.6_amd64.deb
    upgrade/updates/libc6_2.35-0ubuntu3.6_amd64.deb
    root@1.srv.node1.node.dyn.kata:/data/upgrade# cd /data/upgrade/
    root@1.srv.node1.node.dyn.kata:/data/upgrade# chmod +x ./install_kata_upgrade.sh
    root@1.srv.node1.node.dyn.kata:/data/upgrade# ./install_kata_upgrade.sh
    Processing ./kata_license-1.0-py3-none-any.whl
    Installing collected packages: kata-license
      Attempting uninstall: kata-license
        Found existing installation: kata-license 1.0
        Uninstalling kata-license-1.0:
          Successfully uninstalled kata-license-1.0
    Successfully installed kata-license-1.0
    WARNING: There was an error checking the latest version of pip.
    Processing ./kata_upgrade-1.0-py3-none-any.whl
    Installing collected packages: kata-upgrade
      Attempting uninstall: kata-upgrade
        Found existing installation: kata-upgrade 1.0
        Uninstalling kata-upgrade-1.0:
          Successfully uninstalled kata-upgrade-1.0
    Successfully installed kata-upgrade-1.0
    WARNING: There was an error checking the latest version of pip.
    Installation was successful!
  • Then execute and wait until completion 
    kata-upgrade --data-dir /data/upgrade/ --password <password of the 'admin' user>       <<<<<<<< use ' ' symbols if special symbols are presented in password
     
    ............................................................................................................................................................
     
    2024-09-10 16:47:24,839.839 [kata_upgrade.context.ssh_execution_context][INFO] manager.cluster.dyn.kata: Closed ssh session
    2024-09-10 16:47:24,839.839 [kata_upgrade.tasks.upgrade_base_task][INFO] Upgrade task "Update product stack sizing via management api (UpdateSizing)" completed successfully, elapsed time: 902.25 sec
    2024-09-10 16:47:24,840.840 [kata_upgrade.updater.updater][INFO] WARNING: Please close all current user sessions to complete the upgrade process.
  • Patch 6.0.2 is installed, you can check it at web UI
     image.thumb.png.26e166f346115347899ff48f302a245d.png

6.0.2 > 6.0.3 https://support.kaspersky.com/KATA/6.0/en-US/286625.htm

  • Upload kata-cn-upgrade-6.0.3.sh to /home/admin
  • Execute following commands below 
    root@1.srv.node1.node.dyn.kata:/data/upgrade# chmod +x /home/admin/kata-cn-upgrade-6.0.3.sh
    root@1.srv.node1.node.dyn.kata:/data/upgrade# cd /home/admin/
    root@1.srv.node1.node.dyn.kata:/home/admin# sh kata-cn-upgrade-6.0.3.sh
  • Check that there are no errors like this 
    root@1.srv.node1.node.dyn.kata:/home/admin# cat /tmp/ks_check_klava_patch.log
    before
    total 1016
    -rwxr-xr-x 1 root   root        561 Nov 15  2023 check_aapt
    -rwxr-xr-x 1 root   root        306 Nov 16  2023 check_aptfr
    -rwxr-xr-x 1 root   root       1592 Nov 15  2023 check_aptfs
    -rwxr-xr-x 1 root   root       1860 Nov 15  2023 check_aptsn
    -rwxr-xr-x 1 kluser klusers 1011432 Oct 20  2023 check_hips2
    -rwxr-xr-x 1 root   root        287 Nov 16  2023 check_ksn
    -rwxr-xr-x 1 root   root        409 Nov 15  2023 dispatcher
    -rwxr-xr-x 1 root   root       1315 Nov 16  2023 validate_ioa_rules
    after
    total 1016
    -rwxr-xr-x 1 root   root        561 Nov 15  2023 check_aapt
    -rwxr-xr-x 1 root   root        306 Nov 16  2023 check_aptfr
    -rwxr-xr-x 1 root   root       1592 Nov 15  2023 check_aptfs
    -rwxr-xr-x 1 root   root       1860 Nov 15  2023 check_aptsn
    -rwxr-xr-x 1 kluser klusers 1011432 Oct 20  2023 check_hips2
    lrwxrwxrwx 1 root   root         50 Sep 10 16:56 check_klava -> /opt/kaspersky/apt-scan-server/libexec/check_klava
    -rwxr-xr-x 1 root   root        287 Nov 16  2023 check_ksn
    -rwxr-xr-x 1 root   root        409 Nov 15  2023 dispatcher
    -rwxr-xr-x 1 root   root       1315 Nov 16  2023 validate_ioa_rules
  • Patch 6.0.3 is installed, it doesn't change version of product at web UI

6.0.3 > 6.1

Please follow https://support.kaspersky.com/help/KATA/6.1/en-US/243480.htm

 

Known problem: after upgrade to 6.1 kata-collect is not found

This is related not only to kata-collect console utility but also other internal console utilities

Solution:
 

$ sudo -i

Edit /etc/bash.bashrc file
 

# vi /etc/bash.bashrc

Enter edit mode by pressing "i" and insert the following line in the very beginning:

source /opt/venv/bin/activate

Like so:

image.thumb.png.de41b716e933dba13ae38815a771c9ec.png

To save press ESC then :wq! and Enter.

After that reconnect to server via SSH.

Known problem: no space on / at 6.1 sensor nodes after installation

Cause: If you do not select any network interface as SPAN then suricata crashes constantly generating core files.

To prevent this select at least one network interface for SPAN on sensor nodes.

Solution if the problem already occured:

  • Reinstall.
  • Select at least one network interface for SPAN (Program settings → Configure traffic capture → Setup capture interfaces → Mark at least one network interface)

If reinstallation is difficult and / is already full and you cannot get into preprocessor_span container to check its / content then:

  • Select at least one network interface for SPAN.
  • Change dir to docker container MergedDir
*****@*****.tldr:~# cd $(docker inspect $(docker ps | grep preprocessor_span | awk '{print $1}') | grep Merged | awk -F\" '{print $4}')
*****@*****.tldr:/var/lib/docker/overlay2/c3028dde07229aa8fc6f37b7ac2e04b454765b1b015ec9303ac1a35c38ffda38/merged#
  • Check listing, it should contain a lot of core files
*****@*****.tldr:/var/lib/docker/overlay2/c3028dde07229aa8fc6f37b7ac2e04b454765b1b015ec9303ac1a35c38ffda38/merged# ls -la | head -20
total 60596
drwxr-xr-x 2 root   root     4096 May 18 09:36
drwxr-xr-x 1 root   root     4096 Oct 24 11:12 .
drwx--x--- 5 root   root     4096 Oct 22 14:21 ..
drwxr-xr-x 1 root   root     4096 Oct 22 14:58 application
lrwxrwxrwx 1 root   root        7 Apr 25  2023 bin -> usr/bin
drwxr-xr-x 2 root   root     4096 Apr 18  2022 boot
-rw------- 1 root   root 11939840 Oct 24 11:10 core.103983
-rw------- 1 root   root 11939840 Oct 24 11:10 core.103985
-rw------- 1 root   root 11939840 Oct 24 11:10 core.103987
-rw------- 1 root   root 11939840 Oct 24 11:10 core.103989
-rw------- 1 root   root 11939840 Oct 24 11:10 core.103991
-rw------- 1 root   root 11939840 Oct 24 11:10 core.103993
-rw------- 1 root   root 11939840 Oct 24 11:10 core.104001
-rw------- 1 root   root 11939840 Oct 24 11:10 core.104008
-rw------- 1 root   root 11939840 Oct 24 11:10 core.104010
-rw------- 1 root   root 11939840 Oct 24 11:10 core.104017
-rw------- 1 root   root 11939840 Oct 24 11:10 core.104025
-rw------- 1 root   root 11939840 Oct 24 11:11 core.104027
-rw------- 1 root   root 11939840 Oct 24 11:11 core.104033

 

  • Remove them like so (make sure no unnecessary spaces are in the rm command)
*****@*****.tldr:/var/lib/docker/overlay2/c3028dde07229aa8fc6f37b7ac2e04b454765b1b015ec9303ac1a35c38ffda38/merged# rm -f ./core.[0-9]*

 

  • Reboot

image.png

image.png

image.png

image.png

  • The title was changed to How to upgrade KATA 3.7.2 > 4.0 > 4.1 > 5.0 > 5.1 > 6.0 > 6.1 [KATA/KEDRE]

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now


×
×
  • Create New...