cancel
Showing results for 
Search instead for 
Did you mean: 
kmc
Level 12
Report Inappropriate Content
Message 1 of 6

TIE 2.1.0 Hotfix-3

Jump to solution

Hi All,


anybody installed TIE 2.1.0 HF-3 successfully ? I have installed the new extension and MA MLOS to 5.0.4 as well

i was able to push the TIE platform and TIE server package to TIE/DXL server using client task catlog successfully but updated version of the TIE is not reflected in ePO.

Any suggestion or guidelines are welcomed

1 Solution

Accepted Solutions
kmc
Level 12
Report Inappropriate Content
Message 3 of 6

Re: TIE 2.1.0 Hotfix-3

Jump to solution

We are able to deploy successfully with the help of the client task assignment task.

response from the McAfee supoort

- The Run client task now option does use the Data Channel communication using port 8081.

· Hence, there are highly likely chances where in there could be any reason in the data channel communication to fail.

· So, we always recommend our customers to perform any of this task using the Client task assignment option in a scheduled manner.

5 Replies
Reliable Contributor Troja
Reliable Contributor
Report Inappropriate Content
Message 2 of 6

Re: TIE 2.1.0 Hotfix-3

Jump to solution

Hello,

have you checked the logs on the TIE Server? TIE writes a log for Platform and Server upgrade.

Cheers

kmc
Level 12
Report Inappropriate Content
Message 3 of 6

Re: TIE 2.1.0 Hotfix-3

Jump to solution

We are able to deploy successfully with the help of the client task assignment task.

response from the McAfee supoort

- The Run client task now option does use the Data Channel communication using port 8081.

· Hence, there are highly likely chances where in there could be any reason in the data channel communication to fail.

· So, we always recommend our customers to perform any of this task using the Client task assignment option in a scheduled manner.

Reliable Contributor bretzeli
Reliable Contributor
Report Inappropriate Content
Message 4 of 6

Re: TIE 2.1.0 Hotfix-3

Jump to solution

That means what?

"So, we always recommend our customers to perform any of this task using the Client task assignment option in a scheduled manner"

It does fail OFTEN and THUS we want it run as SCHEDULED (Several times) so if it fails ONCE ir tries a second time.

You did everything right IF you upgraded the Linux Agent to 5.0.4 in the first step. This should be emtnioned on TOP First page in the release notes for the TIE release.

Reliable Contributor bretzeli
Reliable Contributor
Report Inappropriate Content
Message 5 of 6

Re: TIE 2.1.0 Hotfix-3

Jump to solution

With the last update we made to TIE we made all perfect and as mentioned in the Mcafee KB's. We exported/dumped Postrge SQL, we checked it and made backups of all things. We did reboot the TIE. We did Update the special MPLS Agent. We compared DXL version and checked some compatiblity schemas for hours. Well you could guess IT should work at ONCE for this time?

But THIS TIME we had to really do the two STEPS of DEPLOYING components to the TIE Server for 4 (FOUR) times until thsi worked for us. We did have to use the VM Snapshot we did before but i allmost made open a ticket.

 

Comming from M$ That's like running apt-get on Redhat Enterprise or Centos and then 500 screens flush by and it updates Perl, Python, kernel, 1200 Library BUT it works.

IF not you analyse 2 week why. If oyu ask the TUX guys what was updated?

So normal behaviour in TUX world i guess.... 😉

 

 

 

 

Reliable Contributor bretzeli
Reliable Contributor
Report Inappropriate Content
Message 6 of 6

TIE 2.1.1 Release 2.1.1-241 HOTFIX UPDATE DONE TODAY 19.03.2018

Jump to solution

Hello,

Just did a TIE 2.1.1 HOTFIX 3 Update today and for the second time in the past years we had to JUMP back to a VM Snapshot. Re-deploy did not bring something. It was the PLATFORM Part which did not work this time.

Well i have to state again that i am happy that we can DEPLOY/UPDATE to TUX via Windows GUI (and also Windows Guys can do it). Just a little strange when we have to do it 4 trimes in a row to get it done.

This time re-deploy did not solve. Reboot of TIE did not solve. And we HAD to go back to a snapshot with the TIE which i don't like. We have our POSTGRE DUMPS but also there some script would be nice WHERE we can auto DUMP the POSTRGRE to some Share external with credentials?

Here is our Plattfoprm Logfile from /VAR/LOGS/ from the TIE Server. For M$ people > You can connect with WINSCP with root and your TIE admin PW and check the files yourself.

 

 

 

 

Mon Mar 19 10:08:56 UTC 2018
03-19-18 10:08:56 Installing from /var/McAfee/agent/update/Current/TIEPLAT_1000/Install/0000
Installing McAfee Agent certificates ...
McAfee Agent is installed, trying to install certificate.
McAfee Agent is already configured with latest sha1 certificate.
McAfee Agent is already configured with latest sha256 certificate.
03-19-18 10:08:56 Before unzips:
03-19-18 10:08:56 Before unzips:
03-19-18 10:08:56 ls -lR /var/McAfee/agent/update/Current/TIEPLAT_1000/Install/0000
/var/McAfee/agent/update/Current/TIEPLAT_1000/Install/0000:
total 179092
-rwxr--r-- 1 root root      4594 Mar 19 10:08 deploycerts17_19.sh
-rwxr--r-- 1 root root 182891010 Mar 19 10:08 files.tar.gz
-rwxr--r-- 1 root root      3695 Mar 19 10:08 tie_setup.sh
-rwxr--r-- 1 root root      3276 Mar 19 10:08 tieinstall.mcs
-rwxr--r-- 1 root root    291832 Mar 19 10:08 tieplatform-2.1.1-241.mlos2.x86_64.rpm
03-19-18 10:08:56 Untaring files.tar.gz
03-19-18 10:08:56 tar -xvf /var/McAfee/agent/update/Current/TIEPLAT_1000/Install/0000/files.tar.gz -C /var/McAfee/agent/update/Current/TIEPLAT_1000/Install/0000
rpms/
rpms/shadow-utils-4.1.5.1-5.mlos2.x86_64.rpm
rpms/libuser-0.56.13-9.mlos2.x86_64.rpm
rpms/perl-libs-5.10.1-144.mlos2.x86_64.rpm
rpms/mlos-license-1.0-1.mlos2.noarch.rpm
rpms/libselinux-2.0.94-7.mlos2.x86_64.rpm
rpms/sed-4.2.1-10.mlos2.x86_64.rpm
rpms/passwd-0.77-7.mlos2.x86_64.rpm
rpms/python-2.6.6-67.mlos2.x86_64.rpm
rpms/libxml2-2.7.6-22.mlos2.x86_64.rpm
rpms/gdbm-1.8.0-39.mlos2.x86_64.rpm
rpms/openssh-server-6.6.1p1-29.mlos2.x86_64.rpm
rpms/nethogs-0.8.2-1.mlos2.x86_64.rpm
rpms/glibc-2.12-19.mlos2.x86_64.rpm
rpms/mlos-fipshook-libs-1.1-6.mlos2.x86_64.rpm
rpms/gmp-4.3.1-12.mlos2.x86_64.rpm
rpms/perl-Module-Pluggable-3.90-144.mlos2.x86_64.rpm
rpms/util-linux-ng-2.17.2-12.28.mlos2.x86_64.rpm
rpms/crontabs-1.10-33.mlos2.noarch.rpm
rpms/audit-libs-2.4.5-6.mlos2.x86_64.rpm
rpms/vim-minimal-7.4.629-5.mlos2.x86_64.rpm
rpms/grep-2.20-6.mlos2.x86_64.rpm
rpms/tcp_wrappers-libs-7.6-58.mlos2.x86_64.rpm
rpms/iptables-ipv6-1.6.1-1.mlos2.x86_64.rpm
rpms/dhcp-common-4.1.1-51.mlos2.x86_64.rpm
rpms/libstdc++-4.4.7-16.mlos2.x86_64.rpm
rpms/coreutils-libs-8.4-46.mlos2.x86_64.rpm
rpms/sqlite-3.6.20-2.mlos2.x86_64.rpm
rpms/libacl-2.2.49-7.mlos2.x86_64.rpm
rpms/mlos-release-2.2-4.mlos2.noarch.rpm
rpms/libcurl-7.19.7-53.mlos2.x86_64.rpm
rpms/glib2-2.28.8-10.mlos2.x86_64.rpm
rpms/libss-1.41.12-23.mlos2.x86_64.rpm
rpms/libpcap-1.4.0-4.mlos2.x86_64.rpm
rpms/glibc-common-2.12-19.mlos2.x86_64.rpm
rpms/nss-softokn-freebl-3.14.3-24.mlos2.i686.rpm
rpms/openssh-6.6.1p1-29.mlos2.x86_64.rpm
rpms/nspr-4.13.1-1.mlos2.x86_64.rpm
rpms/ncurses-libs-5.7-4.20090207.mlos2.x86_64.rpm
rpms/sysvinit-tools-2.87-6.mlos2.x86_64.rpm
rpms/upstart-0.6.5-16.mlos2.x86_64.rpm
rpms/device-mapper-persistent-data-0.6.2-2.mlos2.x86_64.rpm
rpms/device-mapper-libs-1.02.117-12.mlos2.x86_64.rpm
rpms/ustr-1.0.4-9.1.mlos2.x86_64.rpm
rpms/bash-4.1.2-48.mlos2.x86_64.rpm
rpms/db4-4.7.25-22.mlos2.x86_64.rpm
rpms/libuuid-2.17.2-12.28.mlos2.x86_64.rpm
rpms/nss-softokn-freebl-3.14.3-24.mlos2.x86_64.rpm
rpms/coreutils-8.4-46.mlos2.x86_64.rpm
rpms/lvm2-libs-2.02.143-12.mlos2.x86_64.rpm
rpms/dbus-libs-1.2.24-8.mlos2.x86_64.rpm
rpms/findutils-4.4.2-9.mlos2.x86_64.rpm
rpms/libmnl-1.0.2-3.mlos2.x86_64.rpm
rpms/rsync-3.0.6-12.mlos2.x86_64.rpm
rpms/biosdevname-0.7.2-1.mlos2.x86_64.rpm
rpms/nss-util-3.28.4-1.mlos2.x86_64.rpm
rpms/cpio-2.10-13.mlos2.x86_64.rpm
rpms/device-mapper-event-libs-1.02.117-12.mlos2.x86_64.rpm
rpms/open-vm-tools-10.1.10-1.mlos2.x86_64.rpm
rpms/openldap-2.4.40-16.mlos2.x86_64.rpm
rpms/libgcc-4.4.7-16.mlos2.x86_64.rpm
rpms/libusb1-1.0.9-1.mlos2.x86_64.rpm
rpms/cyrus-sasl-lib-2.1.23-16.mlos2.x86_64.rpm
rpms/nss-tools-3.28.4-3.mlos2.x86_64.rpm
rpms/module-init-tools-3.9-26.mlos2.x86_64.rpm
rpms/libtasn1-2.3-6.mlos2.x86_64.rpm
rpms/libaio-0.3.107-10.mlos2.x86_64.rpm
rpms/e2fsprogs-libs-1.41.12-23.mlos2.x86_64.rpm
rpms/kernel-4.9.83-1.mlos2.x86_64.rpm
rpms/mkinitrd-6.1-30.mlos2.x86_64.rpm
rpms/openssl-libs-1.0.2n-1.mlos2.x86_64.rpm
rpms/device-mapper-1.02.117-12.mlos2.x86_64.rpm
rpms/inits

> STOPPED here several TIMES by rpms/inits 

 

 

 

More McAfee Tools to Help You
  • Subscription Service Notification (SNS)
  • How-to: Endpoint Removal Tool
  • Support: Endpoint Security
  • eSupport: Policy Orchestrator
  • Community Help Hub

      New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

    • Find Forum FAQs
    • Learn How to Earn Badges
    • Ask for Help
    Go to Community Help

    Join the Community

      Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

    • Get helpful solutions from McAfee experts.
    • Stay connected to product conversations that matter to you.
    • Participate in product groups led by McAfee employees.
    Join the Community
    Join the Community