Fix Readme
Abstract
The following document is the documentation for IBM Cloud Pak for Automation 20.0.3 IF012.
Including download and installation information and the list of APARs that are resolved in this interim fix.
Content
| Readme file for: | IBM Cloud Pak® Automation |
|---|---|
| Product Release: | 20.0.3 |
| Update Name: | 20.0.3 IF012 |
| Fix ID: | 20.0.3-WS-CP4A-IF012 |
| Publication Date: | 13 January 2022 |
| Last modified date: | 20 January 2022 |
Contents
Components impacted
Prior to installation
Installing
Performing the necessary tasks after installation
Uninstalling
List of fixes
Known Limitations
Document change history
Prerequisites
- Download the installation script resources https://github.com/icp4a/cert-kubernetes/archive/20.0.3.2.tar.gz and extract the files to your local machine.
- Change directory to the "cert-kubernetes" folder.
Components impacted
Prior to installation
- cp.icr.io/cp/cp4a/ads/ads-runtime:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-admin:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-bawadv:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-bpmn:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-content:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-event-forwarder:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-elasticsearch:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-flink:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-flink-taskmanager:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-flink-zookeeper:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-icm:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-ingestion:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-init:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-kibana:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-management:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-monitoring-app:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-odm:20.0.3-IF012
- cp.icr.io/cp/cp4a/bai/bai-setup:20.0.3-IF012
- cp.icr.io/cp/cp4a/baw/pfs-elasticsearch-prod:20.0.3-IF012
- cp.icr.io/cp/cp4a/ban/navigator:ga-309-icn-la009
- cp.icr.io/cp/cp4a/ban/navigator-sso:ga-309-icn-la009
- cp.icr.io/cp/cp4a/bas/bastudio:20.0.3-IF011
- cp.icr.io/cp/cp4a/bas/workflow-authoring:20.0.3-IF011
- cp.icr.io/cp/cp4a/baw/workflow-server:20.0.3-IF011
- cp.icr.io/cp/cp4a/baw/workflow-server-dbhandling:20.0.3-IF011
- cp.icr.io/cp/cp4a/baw/pfs-prod:20.0.3-IF011
- cp.icr.io/cp/cp4a/fncm/taskmgr:ga-309-tm-la009
- cp.icr.io/cp/cp4a/baw/workflow-server-case-initialization:20.0.3-IF009
- cp.icr.io/cp/cp4a/fncm/cpe:ga-556-p8cpe-la006
- cp.icr.io/cp/cp4a/ums/ums:20.0.3-IF003
Installing
You can access the container images in the IBM image registry with your IBMid.
- Log in to MyIBM Container Software Library with the IBMid and password that is associated with the entitled software.
- In the Container software library tile, click "View library" and then click "Copy key" to copy the entitlement key to the clipboard.
- Log in to your Kubernetes cluster and set the context to the project/namespace for your existing deployment.
- Create a pull secret by running a kubectl create secret command.
$ kubectl create secret docker-registry admin.registrykey --docker-server=cp.icr.io --docker-username=cp --docker-password="<API_KEY_GENERATED>" --docker-email=<USER_EMAIL>
Note: The "cp.icr.io" value for the docker-server parameter is the only registry domain name that contains the images. Use "cp" for the docker-username. The docker-email must be a valid email address (associated to your IBM ID). Make sure you are copying the Entitlement Key in the docker-password field within double quotation marks. - Take a note of the secret and the server values so that you can set them to the "pullSecrets" and "repository" parameters when you update the operator for your containers.
- Log in to your Kubernetes cluster and set the context to the project for your existing deployment.
$ oc login https://<CLUSTERIP>:<port> -u <ADMINISTRATOR> -p <PASSWORD> -
If the persistent volume (PV) for the operator is defined by a hostPath, provide group write permission according to the PV hostPath.path definition (/root/operator).
$ chmod -R g=u /root/operator
$ chmod g+rw /root/operator
Note: If you are using dynamic provisioning, this step is not needed as the PV is created automatically as per the Storage Class definition. -
Remove the .OPERATOR_TYPE file in case it exists from a previous deployment.
$ rm -f /<hostPath>/.OPERATOR_TYPE
Where hostPath is the value in your PV (root/operator). -
If Business Automation Insights is deployed, prune the Business Automation Insights deployment and jobs before you apply the updated custom resource YAML file.
$ oc delete Deployment,Job -l \ > 'app.kubernetes.io/name=ibm-business-automation-insights'Tip: For Flink event processing to resume from its previous state, make sure that savepoints are created before the upgrade and specified in the updated CR. For more information see, https://www.ibm.com/docs/en/cloud-paks/cp-biz-automation/20.0.x?topic=tolerance-restarting-from-checkpoint-savepoint -
Go to the downloaded cert-kubernetes folder for the IF012 interim fix.
-
Upgrade the operator in your project by running the following command.$ ./scripts/upgradeOperator.sh -i <registry_url>/icp4a-operator:20.0.3-IF012 -p '<my_secret_name>' -a acceptWhere registry_url is the value for your internal registry or cp.icr.io/cp/cp4a for the IBM Cloud Entitled Registry. The my_secret_name is the secret that is created to access the registry, and accept means that you accept the license.Note: If you plan to use a non-admin user to install the operator, you must add the user to the "ibm-cp4a-operator" role.$ oc adm policy add-role-to-user ibm-cp4a-operator <user_name>
-
Monitor the pod until it shows a STATUS of Running:
$ oc get pods -w
Note: When started, you can monitor the operator logs with the following command:
$ oc logs -f deployment/ibm-cp4a-operator -c operator
workflow_authoring_configuration:
images:
repository: "cp.icr.io/cp/cp4a/bas/workflow-authoring"
tag: "20.0.3-IF012"
baw_configuration:
- name: bawins1
image:
repository: "cp.icr.io/cp/cp4a/baw/workflow-server"
tag: "20.0.3-IF012"
- Check that all the components that you want to upgrade are configured with interim fix image tag values.
$ cat scripts/generated-cr/ibm_cp4a_cr_final.yaml -
Update the configured components by applying the custom resource.$ kubectl apply -f scripts/generated-cr/ibm_cp4a_cr_final.yaml
$ oc get pods -w
$ oc logs <operatorPodName> -f -c operator
Performing the necessary tasks after installation
Uninstalling
List of Fixes
| Colunm title | Column description |
| APAR | The defect number |
| Title | A short description of the defect |
| Sec. | A mark indicates a defect related to security |
| Cont. | A mark indicates a defect specific to the Cloud Pak integration of the component |
| B.I. | A mark indicates the fix has a business impact. Details are found in the title column or the APAR document |
| APAR | Title | Sec. | Cont. | B.I. |
|---|---|---|---|---|
| N/A |
Cloud Pak for Business Automation delivers container images that include operating system level and other open source libraries. Vulnerabilities (CVEs) for these libraries are published regularly.
This interim fix includes fixes for these libraries to address:
CVE-2021-44228, CVE-2021-45046, CVE-2021-45105
Previous interim fixes may have included fixes which are also addressed with this interim fix. Consult the Related links section for readmes of previous interim fixes, at the bottom of this document.
|
X | X |
Known Limitations
Document change history
Related Information
Readme for Cloud Pak for Automation 20.0.3 IF011
Readme for Cloud Pak for Automation 20.0.3 IF010
Readme for Cloud Pak for Automation 20.0.3 IF009
Readme for Cloud Pak for Automation 20.0.3 IF008
Readme for Cloud Pak for Automation 20.0.3 IF007
Readme for Cloud Pak for Automation 20.0.3 IF006
Readme for Cloud Pak for Automation 20.0.3 IF005
Readme for Cloud Pak for Automation 20.0.3 IF004
Readme for Cloud Pak for Automation 20.0.3 IF003
Was this topic helpful?
Document Information
Modified date:
20 January 2022
UID
ibm16539976